did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540209553

Foundations of Security Analysis and Design II

by ; ;
  • ISBN13:

    9783540209553

  • ISBN10:

    3540209557

  • Format: Paperback
  • Copyright: 2004-03-19
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $84.99 Save up to $66.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness. This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro, Italy, in September 2001 and September 2002. The lectures are devoted to:- Formal Approaches to Approximating Noninterference Properties- The Key Establishment Problem- Name-Passing Calculi and Cryptoprimitives- Classification of Security Properties; Network Security- Cryptographic Algorithms for Multimedia Traffic- Security for Mobility

Table of Contents

Two formal approaches for approximating noninterference propertiesp. 1
The key establishment problemp. 44
A survey of name-passing calculi and crypto-primitivesp. 91
Classification of security properties (part II : network security)p. 139
Cryptographic algorithms for multimedia trafficp. 186
Security for mobilityp. 207
Author Indexp. 267
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program