Garcia-Alfaro, Joaquin.
Foundations and Practice of Security 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers / [electronic resource] : edited by Joaquin Garcia-Alfaro, Pascal Lafourcade. - XIII, 253 p. online resource. - Lecture Notes in Computer Science, 6888 0302-9743 ; . - Lecture Notes in Computer Science, 6888 .
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
9783642279010
10.1007/978-3-642-27901-0 doi
Computer science.
Computer Communication Networks.
Software engineering.
Data encryption (Computer science).
Computer software.
Logic design.
Information Systems.
Computer Science.
Data Encryption.
Software Engineering.
Management of Computing and Information Systems.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Logics and Meanings of Programs.
QA76.9.A25
005.82
Foundations and Practice of Security 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers / [electronic resource] : edited by Joaquin Garcia-Alfaro, Pascal Lafourcade. - XIII, 253 p. online resource. - Lecture Notes in Computer Science, 6888 0302-9743 ; . - Lecture Notes in Computer Science, 6888 .
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
9783642279010
10.1007/978-3-642-27901-0 doi
Computer science.
Computer Communication Networks.
Software engineering.
Data encryption (Computer science).
Computer software.
Logic design.
Information Systems.
Computer Science.
Data Encryption.
Software Engineering.
Management of Computing and Information Systems.
Computer Communication Networks.
Algorithm Analysis and Problem Complexity.
Logics and Meanings of Programs.
QA76.9.A25
005.82