Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues (eBook, PDF)
11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers
Redaktion: Okada, Mitsu; Satoh, Ichiro
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues (eBook, PDF)
11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006, Revised Selected Papers
Redaktion: Okada, Mitsu; Satoh, Ichiro
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.

Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 6.36MB
Andere Kunden interessierten sich auch für
Advances in Computer Science - ASIAN 2007. Computer and Network Security (eBook, PDF)40,95 €
Formal Aspects in Security and Trust (eBook, PDF)72,95 €
Engineering Trustworthy Software Systems (eBook, PDF)40,95 €
Engineering Trustworthy Software Systems (eBook, PDF)40,95 €
Computer Security - ESORICS 2006 (eBook, PDF)72,95 €
Advances in Computer Science - ASIAN 2005. Data Management on the Web (eBook, PDF)40,95 €
Mathematical Methods in Computer Science (eBook, PDF)40,95 €-
-
-
Running to more than 360 pages, and complete with online files and updates, this book constitutes the thoroughly refereed post-proceedings of the 11th Asian Computing Science Conference, ASIAN 2006, held in Tokyo, Japan. The 17 revised full papers and 8 revised short papers presented together with 1 invited paper were carefully selected during two rounds of reviewing from 115 submissions. The papers cover theory, practice, applications, and experiences related to secure software.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 364
- Erscheinungstermin: 25. Januar 2008
- Englisch
- ISBN-13: 9783540775058
- Artikelnr.: 44131815
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 364
- Erscheinungstermin: 25. Januar 2008
- Englisch
- ISBN-13: 9783540775058
- Artikelnr.: 44131815
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
ASIAN'2006.- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.- A Symbolic Intruder Model for Hash-Collision Attacks.- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service.- Certificateless Authenticated Two-Party Key Agreement Protocols.- FORM : A Federated Rights Expression Model for Open DRM Frameworks.- A Method of Safety Analysis for Runtime Code Update.- Automata-Based Confidentiality Monitoring.- Efficient and Practical Control Flow Monitoring for Program Security.- Modular Formalization of Reactive Modules in COQ.- Closing Internal Timing Channels by Transformation.- Responsiveness in Process Calculi.- Normal Proofs in Intruder Theories.- Breaking and Fixing Public-Key Kerberos.- Computational Soundness of Formal Indistinguishability and Static Equivalence.- Secrecy Analysis in Protocol Composition Logic.- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations.- On Completeness of Logical Relations for Monadic Types.- A Spatial Logical Characterisation of Context Bisimulation.- Information Hiding in the Join Calculus.- Modeling Urgency in Component-Based Real-Time Systems.- Maintaining Data Consistency of XML Databases Using Verification Techniques.- An Operational Semantics of Program Dependence Graphs for Unstructured Programs.- Combination of Abstractions in the ASTRÉE Static Analyzer.- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus.- Formalization of CTL* in Calculus of Inductive Constructions.- Inferring Disjunctive Postconditions.- An Approach to Formal Verification of Arithmetic Functions in Assembly.
ASIAN'2006.- Security Evaluation of a Type of Table-Network Implementation of Block Ciphers.- A Symbolic Intruder Model for Hash-Collision Attacks.- A Denotational Approach to Scope-Based Compensable Flow Language for Web Service.- Certificateless Authenticated Two-Party Key Agreement Protocols.- FORM : A Federated Rights Expression Model for Open DRM Frameworks.- A Method of Safety Analysis for Runtime Code Update.- Automata-Based Confidentiality Monitoring.- Efficient and Practical Control Flow Monitoring for Program Security.- Modular Formalization of Reactive Modules in COQ.- Closing Internal Timing Channels by Transformation.- Responsiveness in Process Calculi.- Normal Proofs in Intruder Theories.- Breaking and Fixing Public-Key Kerberos.- Computational Soundness of Formal Indistinguishability and Static Equivalence.- Secrecy Analysis in Protocol Composition Logic.- A Type-Theoretic Framework for Formal Reasoning with Different Logical Foundations.- On Completeness of Logical Relations for Monadic Types.- A Spatial Logical Characterisation of Context Bisimulation.- Information Hiding in the Join Calculus.- Modeling Urgency in Component-Based Real-Time Systems.- Maintaining Data Consistency of XML Databases Using Verification Techniques.- An Operational Semantics of Program Dependence Graphs for Unstructured Programs.- Combination of Abstractions in the ASTRÉE Static Analyzer.- Proving Noninterference by a Fully Complete Translation to the Simply Typed ?-Calculus.- Formalization of CTL* in Calculus of Inductive Constructions.- Inferring Disjunctive Postconditions.- An Approach to Formal Verification of Arithmetic Functions in Assembly.







