Description |
1 online resource |
Series |
Lecture notes in computer science, 0302-9743 ; 7796 |
|
Advanced research in computing and software science |
|
LNCS sublibrary. SL 4, Security and cryptology |
|
Lecture notes in computer science ; 7796.
|
|
Lecture notes in computer science. Advanced research in computing and software science.
|
|
LNCS sublibrary. SL 4, Security and cryptology.
|
Contents |
Regular Papers -- Formal Analysis of Privacy for Routing Protocols in Mobile Ad Hoc Networks / Rémy Chrétien, Stéphanie Delaune -- Practical Everlasting Privacy / Myrto Arapinis, Véronique Cortier, Steve Kremer, Mark Ryan -- A Differentially Private Mechanism of Optimal Utility for a Region of Priors / Ehab ElSalamouny, Konstantinos Chatzikokolakis, Catuscia Palamidessi -- Proved Generation of Implementations from Computationally Secure Protocol Specifications / David Cadé, Bruno Blanchet -- Sound Security Protocol Transformations / Binh Thanh Nguyen, Christoph Sprenger -- Logical Foundations of Secure Resource Management in Protocol Implementations / Michele Bugliesi, Stefano Calzavara, Fabienne Eigner, Matteo Maffei -- Keys to the Cloud: Formal Analysis and Concrete Attacks on Encrypted Web Storage / Chetan Bansal, Karthikeyan Bhargavan, Antoine Delignat-Lavaud, Sergio Maffeis -- Lazy Mobile Intruders / Sebastian Mödersheim, Flemming Nielson, Hanne Riis Nielson -- On Layout Randomization for Arrays and Functions / Martín Abadi, Jérémy Planul -- A Theory of Agreements and Protection / Massimo Bartoletti, Tiziana Cimoli, Roberto Zunino -- Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification / Michael Backes, Fabian Bendun, Dominique Unruh -- Proving More Observational Equivalences with ProVerif / Vincent Cheval, Bruno Blanchet -- Formal Verification of e-Auction Protocols / Jannik Dreier, Pascal Lafourcade, Yassine Lakhnech -- Sessions and Separability in Security Protocols / Marco Carbone, Joshua D. Guttman |
Summary |
This book constitutes the refereed proceedings of the Second International Conference on Principles of Security and Trust, POST 2013, held as part of the European Joint Conference on Theory and Practice of Software, ETAPS 2013, in Rome, Italy, in March 2013. The 14 papers included in this volume were carefully reviewed and selected from 59 submissions. They deal with the theoretical and foundational aspects of security and trust such as new theoretical results, practical applications of existing foundational ideas, and innovative theoretical approaches stimulated by pressing practical problems |
Analysis |
Computer science |
|
Computer Communication Networks |
|
Data protection |
|
Data encryption (Computer science) |
|
Information Systems |
|
Systems and Data Security |
|
Management of Computing and Information Systems |
|
computerwetenschappen |
|
computer sciences |
|
informatiesystemen |
|
elektronische handel |
|
electronic commerce |
|
gegevensbeheer |
|
data management |
|
computernetwerken |
|
computer networks |
|
Information and Communication Technology (General) |
|
Informatie- en communicatietechnologie (algemeen) |
Bibliography |
Includes bibliographical references and author index |
Notes |
English |
Subject |
Computer security -- Congresses
|
|
Computer networks -- Security measures -- Congresses
|
|
Data encryption (Computer science) -- Congresses
|
|
Computer networks.
|
|
Computer security.
|
|
Computer Communication Networks
|
|
Computer Security
|
|
Computer networks
|
|
Computer networks -- Security measures
|
|
Computer security
|
|
Data encryption (Computer science)
|
Genre/Form |
proceedings (reports)
|
|
Conference papers and proceedings
|
|
Conference papers and proceedings.
|
|
Actes de congrès.
|
Form |
Electronic book
|
Author |
Basin, David.
|
|
Mitchell, John C.
|
|
ETAPS (Conference) (16th : 2013 : Rome, Italy)
|
ISBN |
9783642368301 |
|
3642368301 |
|
3642368298 |
|
9783642368295 |
|