Listing 1 - 3 of 3 |
Sort by
|
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 27 submissions. The papers feature topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis.
Computer security --- Formal methods (Computer science) --- Cryptography --- Computer Science --- Engineering & Applied Sciences --- Data protection --- Computer science. --- Computer organization. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Coding theory. --- Algorithms. --- Computer Science. --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Coding and Information Theory. --- Computer Communication Networks. --- Algorithm Analysis and Problem Complexity. --- Computer Systems Organization and Communication Networks. --- Algorism --- Algebra --- Arithmetic --- Data compression (Telecommunication) --- Digital electronics --- Information theory --- Machine theory --- Signal theory (Telecommunication) --- Computer programming --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Organization, Computer --- Electronic digital computers --- Informatics --- Science --- Foundations --- Distributed processing --- Data structures (Computer scienc. --- Computer software. --- Computer network architectures. --- Cryptology. --- Data Structures and Information Theory. --- Architectures, Computer network --- Network architectures, Computer --- Computer architecture --- Software, Computer --- Computer systems --- Information theory. --- Communication theory --- Communication --- Cybernetics --- Intel·ligència artificial --- Seguretat informàtica --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics --- Ciència cognitiva --- Mètodes de simulació --- Processament de dades --- Sistemes autoorganitzatius --- Aprenentatge automàtic --- Demostració automàtica de teoremes --- Intel·ligència artificial distribuïda --- Intel·ligència computacional --- Sistemes adaptatius --- Tractament del llenguatge natural (Informàtica) --- Raonament qualitatiu --- Representació del coneixement (Teoria de la informació) --- Sistemes de pregunta i resposta --- Traducció automàtica --- Visió per ordinador --- Xarxes neuronals (Informàtica) --- Xarxes semàntiques (Teoria de la informació) --- Agents intel·ligents (Programes d'ordinador) --- Programació per restriccions --- Vida artificial
Choose an application
Computer security --- Formal methods (Computer science) --- Cryptography --- Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Software engineering. --- Programming languages (Electronic computers). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Software Engineering. --- Programming Languages, Compilers, Interpreters. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems --- Automated reasoning --- Security protocol analysis --- ARSPA
Choose an application
This book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Theory of Security and Applications (formely known as ARSPA-WITS), TOSCA 2011, held in Saarbrücken, Germany, in March/April 2011, in association with ETAPS 2011. The 9 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 24 submissions. The papers feature topics including various methods in computer security, including the formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, and the modeling of information flow and its application.
Engineering & Applied Sciences --- Computer Science --- Computer security --- Data encryption (Computer science) --- Computer networks --- Security measures --- Computer science. --- Computer communication systems. --- Software engineering. --- Programming languages (Electronic computers). --- Data encryption (Computer science). --- Algorithms. --- Computers and civilization. --- Computer Science. --- Data Encryption. --- Computer Communication Networks. --- Computers and Society. --- Algorithm Analysis and Problem Complexity. --- Software Engineering. --- Programming Languages, Compilers, Interpreters. --- Civilization and computers --- Civilization --- Algorism --- Algebra --- Arithmetic --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Computer languages --- Computer program languages --- Computer programming languages --- Machine language --- Electronic data processing --- Languages, Artificial --- Computer software engineering --- Engineering --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Foundations --- Distributed processing --- Computer software. --- Cryptology. --- Software, Computer --- Computer systems
Listing 1 - 3 of 3 |
Sort by
|