This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.…mehr
This book constitutes the refereed proceedings of the 13th Asian Computing Science Conference, ASIAN 2009, held in Seoul, Korea, in December 2009. The 7 revised full papers and 3 revised short papers presented together with 2 invited talks were carefully reviewed and selected from 45 submissions. Focusing on the theory and practice of information security and privacy, the papers include topics of deducibility constraints, symmetric encryption modes, dynamic security domains and policies, cryptography, formal verification of quantum programs, decision of static equivalence, authenticated message and proxy signature scheme.
Produktdetails
Produktdetails
Theoretical Computer Science and General Issues 5913
Die Herstellerinformationen sind derzeit nicht verfügbar.
Inhaltsangabe
"Logic Wins!".- Higher-Order Program Verification and Language-Based Security.- Deducibility Constraints.- Automated Security Proof for Symmetric Encryption Modes.- Noninterference with Dynamic Security Domains and Policies.- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers.- A Logic for Formal Verification of Quantum Programs.- Reducing Equational Theories for the Decision of Static Equivalence.- A Simulation-Based Treatment of Authenticated Message Exchange.- Trusted Deployment of Virtual Execution Environment in Grid Systems.- A Dolev-Yao Model for Zero Knowledge.- A Special Proxy Signature Scheme with Multi-warrant.
"Logic Wins!".- Higher-Order Program Verification and Language-Based Security.- Deducibility Constraints.- Automated Security Proof for Symmetric Encryption Modes.- Noninterference with Dynamic Security Domains and Policies.- A Critique of Some Chaotic-Map and Cellular Automata-Based Stream Ciphers.- A Logic for Formal Verification of Quantum Programs.- Reducing Equational Theories for the Decision of Static Equivalence.- A Simulation-Based Treatment of Authenticated Message Exchange.- Trusted Deployment of Virtual Execution Environment in Grid Systems.- A Dolev-Yao Model for Zero Knowledge.- A Special Proxy Signature Scheme with Multi-warrant.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826