Verlag: Berlin, Springer., 1999
Sprache: Englisch
Anbieter: Antiquariat Thomas Haker GmbH & Co. KG, Berlin, Deutschland
Verbandsmitglied: GIAQ
EUR 7,50
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbPaperback. Zustand: Wie neu. XI, 572 S.: with figures, 24 cm, Like new. Shrink wrapped. / Wie neu. In Folie verschweißt. Sprache: Englisch Gewicht in Gramm: 830.
Anbieter: Studibuch, Stuttgart, Deutschland
EUR 10,42
Währung umrechnenAnzahl: 1 verfügbar
In den Warenkorbpaperback. Zustand: Gut. 596 Seiten; 9783540664253.3 Gewicht in Gramm: 1.
Verlag: Springer International Publishing, 2018
ISBN 10: 3319748599 ISBN 13: 9783319748597
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 41,37
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Cambridge, Cambridge University Press, ,, 1993
Anbieter: Antiquariat Gothow & Motzke, Berlin, Deutschland
EUR 30,00
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbGross - 8° / large - 8°, XI/197 S./pp., Originalpappband (publisher's cardboard covers), Bibliotheksexemplar in sehr gutem Zustand / exlibrary in excellent condition (Stempel auf Titel / title stamped, Rückenschildchen / lettering pannel to the spine, Block sehr gut / contents fine, keine Unterstreichungen oder Anstreichungen / no underlining or remarks, nicht in Folie eingeschlagen / not wrapped up in foil), (Cambridge Tracts in Theoretical Computer Science 36), Sprache: englisch.
Verlag: Springer International Publishing, 2016
ISBN 10: 3319299670 ISBN 13: 9783319299679
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 44,94
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.The 5 revised full papers presented together with one short tool paper and one invited lecture were carefully reviewed and selected from 13 submissions. The workshop contributes to the development of well-founded graphical security models, efficient algorithms for their analysis, as well as methodologies for their practical usage, thus providing an intuitive but systematic methodology to analyze security weaknesses of systems and to evaluate potential protection measures.
Verlag: Springer International Publishing, Springer International Publishing Feb 2016, 2016
ISBN 10: 3319299670 ISBN 13: 9783319299679
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 44,94
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -This volume constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Graphical Models for Security, GraMSec 2015, held in Verona, Italy, in July 2015.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 116 pp. Englisch.
Verlag: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319748599 ISBN 13: 9783319748597
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 44,94
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes revised selected papers from the 4th International Workshop on Graphical Models for Security, GraMSec 2017, held in Santa Barbara, CA, USA, in August 2017. The 5 full and 4 short papers presented in this volume were carefully reviewed and selected from 19 submissions. The book also contains one invited paper from the WISER project. The contributions deal with the latest research and developments on graphical models for security.
Verlag: Springer International Publishing, Springer International Publishing Sep 2014, 2014
ISBN 10: 3319118501 ISBN 13: 9783319118505
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 51,36
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 220 pp. Englisch.
Verlag: Springer International Publishing, 2014
ISBN 10: 3319118501 ISBN 13: 9783319118505
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 51,36
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 10th International Workshop on Security and Trust Management, STM 2014, held in Wroclaw, Poland, in September 2014, in conjunction with the 19th European Symposium Research in Computer Security, ESORICS 2014. The 11 revised full papers were carefully reviewed and selected from 29 submissions and cover topics as access control, data protection, digital rights, security and trust policies, security and trust in social networks.
Verlag: Springer Berlin Heidelberg, 2014
ISBN 10: 3642430538 ISBN 13: 9783642430534
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,45
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.The methodology's strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.
Verlag: Springer International Publishing, Springer Nature Switzerland Sep 2019, 2019
ISBN 10: 303031510X ISBN 13: 9783030315108
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions.The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 180 pp. Englisch.
Verlag: Springer International Publishing, Springer International Publishing Jun 2018, 2018
ISBN 10: 3319823329 ISBN 13: 9783319823324
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, held in Darmstadt, Germany, in July 2016. The 7 revised full papers and 7 short papers presented together with an invited paper were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics including trust architecture, trust modeling, trust metrics and computation, reputation and privacy, security and trust, sociotechnical aspects of trust, and attacks on trust and reputation systems.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 204 pp. Englisch.
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Jun 2008, 2008
ISBN 10: 3540694846 ISBN 13: 9783540694847
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008. The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 256 pp. Englisch.
Verlag: Springer International Publishing, Springer International Publishing Jul 2016, 2016
ISBN 10: 3319413538 ISBN 13: 9783319413532
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware -This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, held in Darmstadt, Germany, in July 2016. The 7 revised full papers and 7 short papers presented together with an invited paper were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics including trust architecture, trust modeling, trust metrics and computation, reputation and privacy, security and trust, sociotechnical aspects of trust, and attacks on trust and reputation systems.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 204 pp. Englisch.
Verlag: Springer International Publishing, Springer International Publishing, 2018
ISBN 10: 3319823329 ISBN 13: 9783319823324
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, held in Darmstadt, Germany, in July 2016. The 7 revised full papers and 7 short papers presented together with an invited paper were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics including trust architecture, trust modeling, trust metrics and computation, reputation and privacy, security and trust, sociotechnical aspects of trust, and attacks on trust and reputation systems.
Verlag: Springer International Publishing, 2016
ISBN 10: 3319413538 ISBN 13: 9783319413532
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 10th IFIP WG 11.11 International Conference on Trust Management, IFIPTM 2016, held in Darmstadt, Germany, in July 2016. The 7 revised full papers and 7 short papers presented together with an invited paper were carefully reviewed and selected from 26 submissions. The papers cover a wide range of topics including trust architecture, trust modeling, trust metrics and computation, reputation and privacy, security and trust, sociotechnical aspects of trust, and attacks on trust and reputation systems.
Verlag: Springer Berlin Heidelberg, 2008
ISBN 10: 3540694846 ISBN 13: 9783540694847
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 5th European Public Key Infrastructure Workshop: Theory and Practice, EuroPKI 2008, held in Trondheim, Norway, in June 2008. The 15 revised full papers presented together with 1 invited paper were carefully reviewed and selected from 37 submissions. Ranging from theoretical and foundational topics to applications and regulatory issues in various contexts, the papers focus on all research and practice aspects of PKI and show ways how to construct effective, practical, secure and low cost means for assuring authenticity and validity of public keys used in large-scale networked services.
Verlag: Springer International Publishing, Springer International Publishing, 2019
ISBN 10: 303031510X ISBN 13: 9783030315108
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the proceedings of the 15th International Workshop on Security and Trust Management, STM 2019, held in Luxembourg City, Luxembourg, in September 2019, and co-located with the 24th European Symposium Research in Computer Security, ESORICS 2019. The 9 full papers and 1 short paper were carefully reviewed and selected from 23 submissions.The papers present novel research on all theoretical and practical aspects of security and trust in ICTs.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 49,76
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 51,43
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Verlag: Springer Berlin / Heidelberg, 2012
ISBN 10: 354078635X ISBN 13: 9783540786351
Sprache: Englisch
Anbieter: Better World Books Ltd, Dunfermline, Vereinigtes Königreich
EUR 51,76
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: Good. Ships from the UK. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 52,12
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 60,39
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. This is a Brand-new US Edition. This Item may be shipped from US or any other country as we have multiple locations worldwide.
Verlag: Cambridge University Press, 2008
ISBN 10: 0521088127 ISBN 13: 9780521088121
Sprache: Englisch
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 55,68
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 52,05
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 256 49:B&W 6.14 x 9.21 in or 234 x 156 mm (Royal 8vo) Perfect Bound on White w/Gloss Lam.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 58,03
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,02
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Verlag: Springer Berlin Heidelberg, 2012
ISBN 10: 354078635X ISBN 13: 9783540786351
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 69,54
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.The methodology's strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Okt 2012, 2012
ISBN 10: 354078635X ISBN 13: 9783540786351
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 69,54
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware -Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool.The methodology¿s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 188 pp. Englisch.
Verlag: Springer-Verlag New York Inc, 2016
ISBN 10: 3319299670 ISBN 13: 9783319299679
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 61,86
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 116 pages. 9.25x6.10x0.27 inches. In Stock.