Wintersalen Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Tour our stores


    Recently Viewed clear list


    Original Essays | November 7, 2014

    Karelia Stetz-Waters: IMG The Hot Sex Tip Cosmo Won't Tell You



    Cosmopolitan Magazine recently released an article titled "28 Mind-Blowing Lesbian Sex Positions." Where was this vital information when I was a... Continue »
    1. $10.47 Sale Trade Paper add to wish list

    spacer
Qualifying orders ship free.
$99.25
New Hardcover
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Mathematics- Logic and Philosophy

This title in other editions

Formal Correctness of Security Protocols (Information Security and Cryptography)

by

Formal Correctness of Security Protocols (Information Security and Cryptography) Cover

 

Synopses & Reviews

Publisher Comments:

Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating. This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking.

Synopsis:

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.

Table of Contents

Introduction.- The Analysis of Security Protocols.- The Inductive Method.- Verifying the Protocol Goals.- The Principle of Goal Availability.- Modelling Timestamping and Verifying a Classical Protocol.- Verifying a Deployed Protocol.- Modelling Agents' Knowledge of Messages.- Verifying Another Deployed Protocol.- Modelling Smartcards.- Verifying a Smartcard Protocol.- Modelling Accountability.- Verifying Two Accountability Protocols.- Conclusions.- Appendices.- References

Product Details

ISBN:
9783540681342
Author:
Bella, Giampaolo
Publisher:
Springer
Subject:
Logic
Subject:
Computer Science
Subject:
Artificial Intelligence - General
Subject:
Intelligence (AI) & Semantics
Subject:
Formal methods
Subject:
Inductive techniques
Subject:
protocol engineering
Subject:
security protocols
Subject:
Theorem Proving
Subject:
Mathematical Logic and Formal Languages
Subject:
Data Structures, Cryptology and Information Theory
Subject:
Systems and Data Security
Subject:
Artificial Intelligence (incl. Robotics)
Subject:
Communications Engineering, Networks <P>This book investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and cert
Subject:
Mathematics-Logic and Philosophy
Subject:
Communications Engineering, Networks
Edition Description:
Book
Series:
Information Security and Cryptography
Publication Date:
20070431
Binding:
HARDCOVER
Language:
English
Illustrations:
Y
Pages:
294
Dimensions:
235 x 155 mm 1310 gr

Related Subjects

Computers and Internet » Artificial Intelligence » General
Computers and Internet » Computers Reference » General
Computers and Internet » Networking » General
Computers and Internet » Personal Computers » General
Health and Self-Help » Health and Medicine » Medical Specialties
Science and Mathematics » Mathematics » Foundations and Logic
Science and Mathematics » Mathematics » Logic and Philosophy
Science and Mathematics » Mathematics » Probability and Statistics » General
Science and Mathematics » Mathematics » Probability and Statistics » Statistics

Formal Correctness of Security Protocols (Information Security and Cryptography) New Hardcover
0 stars - 0 reviews
$99.25 In Stock
Product details 294 pages Not Avail - English 9783540681342 Reviews:
"Synopsis" by , The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.