We Need Diverse Ya Sale
 
 

Special Offers see all

Enter to WIN a $100 Credit

Subscribe to PowellsBooks.news
for a chance to win.
Privacy Policy

Visit our stores


    Recently Viewed clear list


    The Powell's Playlist | June 15, 2015

    Matthew Quick: IMG Portia Kane's '80s Metal Mix



    Two of Love May Fail's main characters, Portia Kane and Chuck Bass — now in their early 40s — still love the metal music that was... Continue »
    1. $18.19 Sale Hardcover add to wish list

      Love May Fail

      Matthew Quick 9780062285560

    spacer
Qualifying orders ship free.
$99.25
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Mathematics- Logic and Philosophy

This title in other editions

Formal Correctness of Security Protocols (Information Security and Cryptography)

by

Formal Correctness of Security Protocols (Information Security and Cryptography) Cover

 

Synopses & Reviews

Publisher Comments:

Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating. This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking.

Synopsis:

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.

Table of Contents

Introduction.- The Analysis of Security Protocols.- The Inductive Method.- Verifying the Protocol Goals.- The Principle of Goal Availability.- Modelling Timestamping and Verifying a Classical Protocol.- Verifying a Deployed Protocol.- Modelling Agents' Knowledge of Messages.- Verifying Another Deployed Protocol.- Modelling Smartcards.- Verifying a Smartcard Protocol.- Modelling Accountability.- Verifying Two Accountability Protocols.- Conclusions.- Appendices.- References

Product Details

ISBN:
9783642087820
Author:
Bella, Giampaolo
Publisher:
Springer
Subject:
Logic
Subject:
Formal methods
Subject:
Inductive techniques
Subject:
protocol engineering
Subject:
security protocols
Subject:
Theorem Proving
Subject:
Mathematical Logic and Formal Languages
Subject:
Data Structures, Cryptology and Information Theory
Subject:
Systems and Data Security
Subject:
Artificial Intelligence (incl. Robotics)
Subject:
Communications Engineering, Networks <P>This book investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and cert
Subject:
Mathematics-Logic and Philosophy
Subject:
Communications Engineering, Networks
Copyright:
Edition Description:
Softcover reprint of hardcover 1st ed. 2007
Series:
Information Security and Cryptography
Publication Date:
20101129
Binding:
TRADE PAPER
Language:
English
Pages:
294
Dimensions:
235 x 155 mm 450 gr

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Networking » General
Computers and Internet » Networking » Security » General
Computers and Internet » Personal Computers » General
Engineering » Communications » Radar and Microwave
History and Social Science » Economics » General
Reference » Science Reference » Technology
Science and Mathematics » Mathematics » Foundations and Logic
Science and Mathematics » Mathematics » Logic and Philosophy

Formal Correctness of Security Protocols (Information Security and Cryptography) New Trade Paper
0 stars - 0 reviews
$99.25 In Stock
Product details 294 pages Not Avail - English 9783642087820 Reviews:
"Synopsis" by , The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
spacer
spacer
  • back to top

FOLLOW US ON...

     
Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.