|
|
|
|
LEADER |
02582nmm a2200349 u 4500 |
001 |
EB002007114 |
003 |
EBX01000000000000001170014 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
220104 ||| eng |
020 |
|
|
|a 9783030916312
|
100 |
1 |
|
|a Dougherty, Daniel
|e [editor]
|
245 |
0 |
0 |
|a Protocols, Strands, and Logic
|h Elektronische Ressource
|b Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday
|c edited by Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe
|
250 |
|
|
|a 1st ed. 2021
|
260 |
|
|
|a Cham
|b Springer International Publishing
|c 2021, 2021
|
300 |
|
|
|a X, 425 p. 65 illus
|b online resource
|
505 |
0 |
|
|a Cryptography -- Cryptographic Protocols -- Protocol Analysis -- CPSA -- Cybersecurity -- Formal Methods -- Strand Spaces -- Automated Verification -- Model Finding -- Logic -- Attestation -- Accountability -- Differential Privacy -- Quantum Computing -- Game Theory -- Mobile Computing -- Multiset Rewriting -- Proofs and Refutations
|
653 |
|
|
|a Cryptography
|
653 |
|
|
|a Data protection
|
653 |
|
|
|a Data encryption (Computer science)
|
653 |
|
|
|a Cryptology
|
653 |
|
|
|a Data and Information Security
|
700 |
1 |
|
|a Meseguer, José
|e [editor]
|
700 |
1 |
|
|a Mödersheim, Sebastian Alexander
|e [editor]
|
700 |
1 |
|
|a Rowe, Paul
|e [editor]
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b Springer
|a Springer eBooks 2005-
|
490 |
0 |
|
|a Security and Cryptology
|
028 |
5 |
0 |
|a 10.1007/978-3-030-91631-2
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-030-91631-2?nosfx=y
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua’s most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several “symbolic approaches” to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis
|