Foundations of Security, Protocols, and Equational Reasoning : Essays Dedicated to Catherine A. Meadows (Lecture Notes in Computer Science)

個数:
電子版価格
¥9,127
  • 電子版あり

Foundations of Security, Protocols, and Equational Reasoning : Essays Dedicated to Catherine A. Meadows (Lecture Notes in Computer Science)

  • 提携先の海外書籍取次会社に在庫がございます。通常3週間で発送いたします。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合が若干ございます。
    2. 複数冊ご注文の場合、分割発送となる場合がございます。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 239 p.
  • 言語 ENG
  • 商品コード 9783030190514

Full Description

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Fredericksburg, VA, USA, in May 2019.

Catherine A. Meadows has been a pioneer in developing symbolic formal verification methods and tools. Her NRL Protocol Analyzer, a tool and methodology that embodies symbolic model checking techniques, has been fruitfully applied to the analysis of many protocols and protocol standards and has had an enormous influence in the field. She also developed a new temporal logic to specify protocol properties, as well as new methods for analyzing various kinds of properties beyond secrecy such as authentication and resilience under Denial of Service (DoS) attacks and has made important contributions in other areas such as wireless protocol security, intrusion detection, and the relationship between computational and symbolic approaches to cryptography. This volume contains 14 contributionsauthored by researchers from Europe and North America. They reflect on the long-term evolution and future prospects of research in cryptographic protocol specification and verification.



 

 

Contents

Cathy Meadows: A Central Figure in Protocol Analysis.- A Long, Slow Conversation.- Key Reminiscences.- Canonical Narrowing with Irreducibility Constraints as a Symbolic Protocol Analysis Method.- Finding Intruder Knowledge with Cap Matching.- Robust Declassification by Incremental Typing.- JRIF: Reactive Information Flow Control for Java.- Symbolic Timed Trace Equivalence.- Symbolic Analysis of Identity-Based Protocols.- Enrich-by-Need Protocol Analysis for Diffie-Hellman.- Key Agreement via Protocols.- Privacy protocols.- A Multiset Rewriting Model for Specifying and Verifying Timing Aspects of Security Protocols.- Belenios: A Simple Private and Verifiable Electronic Voting System.

最近チェックした商品