Foundations and Practice of Security [electronic resource] : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers / edited by Joaquin Garcia-Alfaro, Pascal Lafourcade.
Contributor(s): Garcia-Alfaro, Joaquin [editor.] | Lafourcade, Pascal [editor.] | SpringerLink (Online service).
Material type: BookSeries: Security and Cryptology: 6888Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012Edition: 1st ed. 2012.Description: XIII, 253 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642279010.Subject(s): Cryptography | Data encryption (Computer science) | Software engineering | Electronic data processing -- Management | Computer networks | Algorithms | Computer science | Cryptology | Software Engineering | IT Operations | Computer Communication Networks | Algorithms | Computer Science Logic and Foundations of ProgrammingAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online In: Springer Nature eBookSummary: This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.No physical items for this record
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
There are no comments for this item.