9783319100814-3319100815-Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Security and Cryptology)

Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Security and Cryptology)

FREE US shipping
Buy

From $16.50

Summary

Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Security and Cryptology) (ISBN-13: 9783319100814 and ISBN-10: 3319100815), written by authors Javier Lopez, Fabio Martinelli, Alessandro Aldini, was published by Springer in 2014. With an overall rating of 4.0 stars, it's a notable title among other Information Management (Processes & Infrastructure, Computer Science, Internet & Networking, Hardware & DIY, Network Security, Security & Encryption, Microsoft Programming, Programming, Programming Languages, Encryption, Cryptography, History & Culture, Management & Leadership) books. You can easily purchase or rent Foundations of Security Analysis and Design VII: FOSAD 2012 / 2013 Tutorial Lectures (Security and Cryptology) (Paperback) from BooksRun, along with many other new and used Information Management books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.3.

Description

FOSAD has been one of the foremost educational events established with the goal of disseminating knowledge in the critical area of security in computer systems and networks. Over the years, both the summer school and the book series have represented a reference point for graduate students and young researchers from academia or industry, interested to approach the field, investigate open problems, and follow priority lines of research. This book presents thoroughly revised versions of nine tutorial lectures given by leading researchers during three International Schools on Foundations of Security Analysis and Design, FOSAD, held in Bertinoro, Italy, in September 2012 and 2013. The topics covered in this book include model-based security, automatic verification of secure applications, information flow analysis, cryptographic voting systems, encryption in the cloud, and privacy preservation.
Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book