Foundations and Practice of Security [electronic resource] : 4th Canada-France MITACS Workshop, FPS 2011, Paris, France, May 12-13, 2011, Revised Selected Papers / edited by Joaquin Garcia-Alfaro, Pascal Lafourcade.
By: Garcia-Alfaro, Joaquin [editor.].
Contributor(s): Lafourcade, Pascal [editor.] | SpringerLink (Online service).
Material type:
BookSeries: Lecture Notes in Computer Science: 6888Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012Description: XIII, 253 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783642279010.Subject(s): Computer science | Computer Communication Networks | Software engineering | Data encryption (Computer science) | Computer software | Logic design | Information Systems | Computer Science | Data Encryption | Software Engineering | Management of Computing and Information Systems | Computer Communication Networks | Algorithm Analysis and Problem Complexity | Logics and Meanings of ProgramsDDC classification: 005.82 Online resources: Click here to access online
In:
Springer eBooksSummary: This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
This book constitutes the carefully refereed and revised selected papers of the 4th Canada-France MITACS Workshop on Foundations and Practice of Security, FPS 2011, held in Paris, France, in May 2011. The book contains a revised version of 10 full papers, accompanied by 3 keynote addresses, 2 short papers, and 5 ongoing research reports. The papers were carefully reviewed and selected from 30 submissions. The topics covered are pervasive security and threshold cryptography; encryption, cryptanalysis and automatic verification; and formal methods in network security.
There are no comments for this item.