Juggling Formal Methods and Security : Essays Dedicated to Sjouke Mauw on the Occasion of His 65th Birthday (Lecture Notes in Computer Science)

個数:
  • 予約

Juggling Formal Methods and Security : Essays Dedicated to Sjouke Mauw on the Occasion of His 65th Birthday (Lecture Notes in Computer Science)

  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版
  • 商品コード 9783032206831

Full Description

This Festschrift is dedicated to Professor Sjouke Mauw on the occasion of his 65th birthday. Prof. Mauw obtained his PhD from the University of Amsterdam and subsequently held faculty and research positions at Eindhoven University of Technology and at Centrum Wiskunde & Informatica (CWI) in Amsterdam. He has collaborated closely with researchers around the world, including colleagues in Australia, Norway, Singapore, and many other countries. Since 2007, he has served as a full professor at the University of Luxembourg, where he leads the Security and Trust of Software Systems group.

A passionate advocate of rigorous formalization, Prof. Mauw specializes in formal methods for information security. He laid the mathematical foundations for attack trees, a practical and widely used security assessment framework, and he contributed extensively to the development of theory and tools for the specification and automated verification of security protocols.

Many members of Sjouke Mauw's scientific family have contributed to this volume to honor a distinguished advisor, exceptional mentor, and outstanding educator.

Contents

Sjouke Mauw: Conqueror of Ambiguities, Inconsistencies, and Incompleteness.- The queue automaton revisited.- Fracterm Calculus for Partial Meadows.- Ethics in Computer Science Research.- A Formal Treatment of the Limits of Authenticated Key Exchange Security.- A Quadratic Lower Bound for Simulation.- How to carve out-of-order fragmented files.- Encrypted and signed file transfer with PostGuard.- Deciding Impossible Futures.- Unfairly Effcient Byzantine-Fault Tolerant Random Number Generation.- Improving Trust in Legal Automation: an Intelligible Approach for Consumer Complaints.- Two decades of secure software development.- Getting Into a Jam with Attack Trees.- Automated Symbolic Verication of Quantum Cryptographic Protocols.

最近チェックした商品