Listing 1 - 10 of 25 << page
of 3
>>
Sort by
Codes : The guide to secrecy from ancient to modern times
Author:
ISBN: 9781584884705 1584884703 9780429146213 Year: 2005 Publisher: Boca Raton (Florida) : Chapman & Hall/CRC,

Hacking cyberspace
Author:
ISBN: 0813336694 Year: 2001 Publisher: Boulder, CO : Westview Press,

The underground guide to computer security : slightly askew advice on protecting your PC and what's on it
Author:
ISBN: 020148918X Year: 1996 Publisher: Reading, Mass. : Addison-Wesley,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Protecting LAN resources : a comprehensive guide to securing, protecting and rebuilding a network
Author:
ISBN: 0471954071 Year: 1995 Publisher: Chichester New York John Wiley and Sons


Book
Sécurité des systèmes d'information
Author:
ISBN: 2100003054 9782100003051 Year: 1991 Publisher: Paris Dunod


Book
Operational Semantics and Verification of Security Protocols
Authors: --- ---
ISBN: 9783540786368 9783540786351 Year: 2012 Publisher: Berlin Heidelberg Springer Berlin Heidelberg Imprint Springer

Loading...
Export citation

Choose an application

Bookmark

Abstract

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodology's strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.


Book
Combating crime in the digital age : a critical review of EU information systems in the area of freedom, security and justice in the post-interoperability era : challenges for criminal law and personal data protection
Authors: --- ---
ISBN: 9789004425224 9004425225 9004425233 9789004425231 Year: 2020 Publisher: Leiden ; Boston : Koninklijke Brill NV

Loading...
Export citation

Choose an application

Bookmark

Abstract

Combating Crime in the Digital Age: A Critical Review of EU Information Systems in the Area of Freedom, Security and Justice; Challenges for Criminal Law and Personal Data Protection' provides a systematic and comprehensive account of EU information systems functioning in the area of freedom, security and justice, with the aim to establish the contemporary links between information sharing and criminal law and evaluate its consequences. Part I offers a systemisation and critical assessment of pertinent systems (ECRIS, ECRIS-TCN, Prum, PNR, Europol, SIS, Eurodac, VIS, EES, ETIAS) and the new interoperability regime from the perspective of their objective to prevent and combat serious crime. Part II explores personal data protection law, police law and criminal procedure law, in order to propose safeguards and limitations for regulating this rapidly evolving framework and addressing the challenges for fundamental principles and rights. The authors' central suggestion is that the issue falls within the context of an emerging precognitive paradigm of criminal law.

Java security : hostile applets, holes, and antidotes
Authors: ---
ISBN: 047117842X 9780471178422 Year: 1997 Publisher: New York (N.Y.): Wiley


Book
Business Information : systems and strategies.
Authors: ---
ISBN: 0135527120 0135527201 Year: 1991 Publisher: New York : Prentice Hall,

Computers at risk : safe computing in the information age
Author:
ISBN: 0309043883 9786610212125 1280212128 0309574609 0585020094 9780585020099 0309074819 9780309074810 9780309043885 9781280212123 6610212120 9780309574600 Year: 1991 Publisher: Washington, D.C. : National Academy Press,

Listing 1 - 10 of 25 << page
of 3
>>
Sort by