Cantitate/Preț
Produs

Theory of Security and Applications: Joint Workshop, TOSCA 2011, Saarbrücken, Germany,March 31-April 1, 2011, Revised Selected Papers: Lecture Notes in Computer Science, cartea 6993

Editat de Sebastian Moedersheim, Catuscia Palamidessi
en Limba Engleză Paperback – 9 ian 2012
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011.The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.
Citește tot Restrânge

Din seria Lecture Notes in Computer Science

Preț: 48546 lei

Nou

Puncte Express: 728

Preț estimativ în valută:
9289 9699$ 7688£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642273742
ISBN-10: 3642273742
Pagini: 234
Ilustrații: IX, 225 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.36 kg
Ediția:2012
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Textul de pe ultima copertă

This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011.
The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.

Caracteristici

Fast-track conference proceedings State-of-the-art research Up-to-date results