Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 20 by Mitsu OkadaAdvances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 20 by Mitsu Okada

Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing…

byMitsu OkadaEditorIchiro Satoh

Hardcover | January 24, 2008

Pricing and Purchase Info

$104.20 online 
$124.50 list price save 16%
Earn 521 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.

Title:Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues: 11th Asian Computing…Format:HardcoverDimensions:364 pages, 23.5 × 15.5 × 0.01 inPublished:January 24, 2008Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540775048

ISBN - 13:9783540775041

Look for similar items by category:

Reviews

Table of Contents

ASIAN'2006.- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.- A Symbolic Intruder Model for Hash-Collision Attacks.- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service.- Certificateless Authenticated Two-Party Key Agreement Protocols.- FORM : A Federated Rights Expression Model for Open DRM Frameworks.- A Method of Safety Analysis for Runtime Code Update.- Automata-Based Confidentiality Monitoring.- Efficient and Practical Control Flow Monitoring for Program Security.- Modular Formalization of Reactive Modules in COQ.- Closing Internal Timing Channels by Transformation.- Responsiveness in Process Calculi.- Normal Proofs in Intruder Theories.- Breaking and Fixing Public-Key Kerberos.- Computational Soundness of Formal Indistinguishability and Static Equivalence.- Secrecy Analysis in Protocol Composition Logic.- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations.- On Completeness of Logical Relations for Monadic Types.- A Spatial Logical Characterisation of Context Bisimulation.- Information Hiding in the Join Calculus.- Modeling Urgency in Component-Based Real-Time Systems.- Maintaining Data Consistency of XML Databases Using Verification Techniques.- An Operational Semantics of Program Dependence Graphs for Unstructured Programs.- Combination of Abstractions in the ASTRÉE Static Analyzer.- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus.- Formalization of CTL* in Calculus of Inductive Constructions.- Inferring Disjunctive Postconditions.- An Approach to Formal Verification of Arithmetic Functions in Assembly.