wyszukanych pozycji: 5
Security and Trust Management: 10th International Workshop, STM 2014, Wroclaw, Poland, September 10-11, 2014, Proceedings
ISBN: 9783319118505 / Angielski / Miękka / 2014 / 210 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.
This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland,...
|
|
cena:
186,78 zł |
Security and Trust Management: 15th International Workshop, STM 2019, Luxembourg City, Luxembourg, September 26-27, 2019, Proceedings
ISBN: 9783030315108 / Angielski / Miękka / 2019 / 169 str. Termin realizacji zamówienia: ok. 20 dni roboczych. |
|
cena:
194,52 zł |
Graphical Models for Security: Second International Workshop, Gramsec 2015, Verona, Italy, July 13, 2015, Revised Selected Papers
ISBN: 9783319299679 / Angielski / Miękka / 2016 / 103 str. Termin realizacji zamówienia: ok. 20 dni roboczych. This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze... This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security,... |
|
cena:
163,43 zł |
Operational Semantics and Verification of Security Protocols
ISBN: 9783642430534 / Angielski / Miękka / 2014 / 174 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model... Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use st... |
|
cena:
194,37 zł |
Operational Semantics and Verification of Security Protocols
ISBN: 9783540786351 / Angielski / Twarda / 2012 / 174 str. Termin realizacji zamówienia: ok. 20 dni roboczych. Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model... Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use st... |
|
cena:
252,89 zł |