Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols.
This handbook of formal analysis in cryptography is very important for secure communication and processing of information. It introduces readers to several formal verification methods and software used to analyse cryptographic protocols.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Sedat Akleylek received the B.Sc. degree in Mathematics majored in Computer Science from Ege University in 2004 in Izmir, Turkey, M.Sc. and Ph.D. degrees in Cryptography from Middle East Technical University in 2008 and 2010, in Ankara, Turkey, respectively. He is currently employed as an associate professor at the Department of Computer Engineering, Ondokuz Mayis University, Samsun, Turkey since 2016. His research interests include in the areas of post-quantum cryptography, algorithms, cryptographic protocols, and architectures for computations in finite fields. He has published more than 20 papers on those topics and presented his work at more than 45 conference papers. He is involved in several nationally and internationally funded research projects on cryptography focusing post-quantum ones. Besik Dundua is an expert in formal methods. He received his PhD degree from the University of Porto in computer science. Afterwards, he worked as a postdoc and visiting researcher in Brazil (University of Brasilia), Austria (Johannes Kepler University Linz), and Germany (The University of Stuttgart). His work concerns various aspects of verification, computational logic, and formal languages: foundational formalisms, computational mechanisms, and implementation ideas. He has published more than 20 papers on those topics and presented his work at more than 30 conference.
Inhaltsangabe
1. Development of Cryptography since Shannon. 2. Introduction to Formal Methods for the Analysis and Design of Protocols. 3. An Introduction to Tools for Formal Analysis of Cryptographic Protocols. 4. Formal Verification of Cryptographic Protocols with Isabelle/HOL. 5. Formal Modelling and Security Analysis of Security Protocols. 6. Cryptographic Web Applications: from Security Engineering to Formal Analysis. 7. Formal Methods for Quantum Algorithms.
1. Development of Cryptography since Shannon. 2. Introduction to Formal Methods for the Analysis and Design of Protocols. 3. An Introduction to Tools for Formal Analysis of Cryptographic Protocols. 4. Formal Verification of Cryptographic Protocols with Isabelle/HOL. 5. Formal Modelling and Security Analysis of Security Protocols. 6. Cryptographic Web Applications: from Security Engineering to Formal Analysis. 7. Formal Methods for Quantum Algorithms.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497