My Account Log in

1 option

Protocols, Strands, and Logic : Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday / edited by Daniel Dougherty, José Meseguer, Sebastian Alexander Mödersheim, Paul Rowe.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Dougherty, Daniel., Editor.
Meseguer, José, Editor.
Mödersheim, Sebastian Alexander., Editor.
Rowe, Paul, Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 13066
Security and Cryptology ; 13066
Language:
English
Subjects (All):
Data protection.
Cryptography.
Data encryption (Computer science).
Data and Information Security.
Cryptology.
Local Subjects:
Data and Information Security.
Cryptology.
Physical Description:
1 online resource (X, 425 pages) : 65 illustrations
Edition:
1st ed. 2021.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2021.
System Details:
text file PDF
Summary:
This Festschrift was published in honor of Joshua Guttman on the occasion of his 66.66 birthday. The impact of his work is reflected in the 23 contributions enclosed in this volume. Joshua's most influential and enduring contribution to the field has been the development of the strand space formalism for analyzing cryptographic protocols. It is one of several "symbolic approaches" to security protocol analysis in which the underlying details of cryptographic primitives are abstracted away, allowing a focus on potential flaws in the communication patterns between participants. His attention to the underlying logic of strand spaces has also allowed him to merge domain-specific reasoning about protocols with general purpose, first-order logical theories. The identification of clear principles in a domain paves the way to automated reasoning, and Joshua has been a leader in the development and distribution of several tools for security analysis.
Contents:
Cryptography
Cryptographic Protocols
Protocol Analysis
CPSA
Cybersecurity
Formal Methods
Strand Spaces
Automated Verification
Model Finding
Logic
Attestation
Accountability
Differential Privacy
Quantum Computing
Game Theory
Mobile Computing
Multiset Rewriting
Proofs and Refutations.
Other Format:
Printed edition:
ISBN:
978-3-030-91631-2
9783030916312
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account