Principles of Security and Trust Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings /

This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume wer...

Full description

Bibliographic Details
Published in:Springer eBooks
Corporate Author: SpringerLink (Online service)
Other Authors: Basin, David (Editor), Mitchell, John C. (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2013.
Series:Lecture Notes in Computer Science,
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-642-36830-1
Перейти в каталог НБ ТГУ
LEADER 03862nam a22005775i 4500
001 vtls000484778
003 RU-ToGU
005 20210922070118.0
007 cr nn 008mamaa
008 140715s2013 gw | s |||| 0|eng d
020 |a 9783642368301  |9 978-3-642-36830-1 
024 7 |a 10.1007/978-3-642-36830-1  |2 doi 
035 |a to000484778 
039 9 |y 201407151948  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Basin, David.  |e editor.  |9 416371 
245 1 0 |a Principles of Security and Trust  |h [electronic resource] :  |b Second International Conference, POST 2013, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2013, Rome, Italy, March 16-24, 2013. Proceedings /  |c edited by David Basin, John C. Mitchell. 
260 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2013.  |9 742158 
300 |a XX, 287 p. 34 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 7796 
505 0 |a Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks -- Practical Everlasting Privacy -- A Differentially Private Mechanism of Optimal Utility for a Region of Priors -- Proved Generation of Implementations from Computationally Secure Protocol Specifications -- Sound Security Protocol Transformations -- Logical Foundations of Secure Resource Management in Protocol Implementations -- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage -- Lazy Mobile Intruders -- On Layout Randomization for Arrays and Functions -- A Theory of Agreements and Protection -- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification -- Proving More Observational Equivalences with ProVerif -- Formal Verification of e-Auction Protocols -- Sessions and Separability in Security Protocols. 
520 |a This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Computer Communication Networks.  |9 566243 
650 0 |a Data protection.  |9 303937 
650 0 |a Data encryption (Computer science).  |9 566260 
650 0 |a Information systems.  |9 303226 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Systems and Data Security.  |9 303939 
650 2 4 |a Computer Communication Networks.  |9 566243 
650 2 4 |a Data Encryption.  |9 566261 
650 2 4 |a e-Commerce/e-business.  |9 413336 
650 2 4 |a Management of Computing and Information Systems.  |9 303227 
700 1 |a Mitchell, John C.  |e editor.  |9 325291 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
830 0 |a Lecture Notes in Computer Science,  |9 279505 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-36830-1 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=357832 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
999 |c 357832  |d 357832