Foundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial Lectures by Riccardo FocardiFoundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial Lectures by Riccardo Focardi

Foundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial Lectures

byRiccardo FocardiEditorRoberto Gorrieri

Paperback | January 28, 2004

Pricing and Purchase Info

$99.62 online 
$117.50 list price save 15%
Earn 498 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

Security is a rapidly growing area of computer science, with direct and increasing relevance to real-life applications, such as Internet transactions, e-commerce, information protection, network and systems security, etc. Foundations for the analysis and design of security features of such applications are badly needed in order to validate and prove their correctness.

This book presents thoroughly revised versions of six tutorial lectures given by leading researchers during two International Schools on Foundations of Security Analysis and Design, FOSAD 2001/2002, held in Bertinoro, Italy, in September 2001 and September 2002. The lectures are devoted to:

- Formal Approaches to Approximating Noninterference Properties

- The Key Establishment Problem

- Name-Passing Calculi and Cryptoprimitives

- Classification of Security Properties; Network Security

- Cryptographic Algorithms for Multimedia Traffic

- Security for Mobility

Title:Foundations of Security Analysis and Design II: FOSAD 2001/2002 Tutorial LecturesFormat:PaperbackDimensions:272 pagesPublished:January 28, 2004Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540209557

ISBN - 13:9783540209553

Look for similar items by category:

Reviews

Table of Contents

Two Formal Approaches for Approximating Noninterference Properties.- The Key Establishment Problem.- A Survey of Name-Passing Calculi and Crypto-Primitives.- Classification of Security Properties.- Cryptographic Algorithms for Multimedia Traffic.- Security for Mobility.