Muutke küpsiste eelistusi

Protocols, Strands, and Logic: Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday 1st ed. 2021 [Pehme köide]

  • Formaat: Paperback / softback, 425 pages, kõrgus x laius: 235x155 mm, kaal: 664 g, 65 Illustrations, black and white; X, 425 p. 65 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 13066
  • Ilmumisaeg: 19-Nov-2021
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030916308
  • ISBN-13: 9783030916305
Teised raamatud teemal:
  • Pehme köide
  • Hind: 70,93 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 83,45 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 425 pages, kõrgus x laius: 235x155 mm, kaal: 664 g, 65 Illustrations, black and white; X, 425 p. 65 illus., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 13066
  • Ilmumisaeg: 19-Nov-2021
  • Kirjastus: Springer Nature Switzerland AG
  • ISBN-10: 3030916308
  • ISBN-13: 9783030916305
Teised raamatud teemal:
This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume.





Joshuas most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several symbolic approaches to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.
Cryptography.- Cryptographic Protocols.- Protocol Analysis.- CPSA.- Cybersecurity.- Formal Methods.- Strand Spaces.- Automated Verification.- Model Finding.- Logic.- Attestation.- Accountability.- Differential Privacy.- Quantum Computing.- Game Theory.- Mobile Computing.- Multiset Rewriting.- Proofs and Refutations.