Buch, Englisch, 199 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 324 g
Reihe: Security and Cryptology
Papers Issued from the 2005-2008 French-Japanese Collaboration
Buch, Englisch, 199 Seiten, Format (B × H): 155 mm x 235 mm, Gewicht: 324 g
Reihe: Security and Cryptology
ISBN: 978-3-642-02001-8
Verlag: Springer
The security issues set by the global digitization of our society have had, and will continue to have, a crucial impact at all levels of our social organization, including, just to mention a few, privacy, economics, environmental policies, national sovereignty, medical environments. The importance of the collaborations in the various ?elds of computer s- ence to solve these problems linked with other sciences and techniques is clearly recognized. Moreover, the collaborative work to bridge the formal theory and practical applications becomes increasingly important and useful. In this context, and since France and Japan have strong academic and ind- trial backgrounds in the theory and practice of the scienti?c challenges set by this digitized world, in 2005 we started a formal French–Japanese collaboration and workshop series on computer security. The three ?rst editions of these French–Japanese Computer Security wo- shops in Tokyo, September 5–7, 2005 and December 4–5, 2006 and in Nancy, March 13–14, 2008 were very fruitful and were accompanied by several imp- tant research exchanges between France and Japan. Because of this success, we launched a call for papers dedicated to computer security from it’s foundation to practice, with the goal of gathering together ?nal versions of the rich set of papers and ideas presented at the workshops, yet opening the call to everyone interested in contributing in this context. This v- ume presents the selection of papers arising from this call and this international collaboration.
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Naturwissenschaften Biowissenschaften Biowissenschaften
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Grafikprogrammierung
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Mustererkennung, Biometrik
- Mathematik | Informatik EDV | Informatik Programmierung | Softwareentwicklung Algorithmen & Datenstrukturen
- Mathematik | Informatik EDV | Informatik EDV & Informatik Allgemein Soziale und ethische Aspekte der EDV
- Mathematik | Informatik EDV | Informatik Informatik Künstliche Intelligenz Wissensbasierte Systeme, Expertensysteme
Weitere Infos & Material
Formal to Practical Security.- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables.- Validating Integrity for the Ephemerizer’s Protocol with CL-Atse.- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols.- Fake Fingers in Fingerprint Recognition: Glycerin Supersedes Gelatin.- Comparing State Spaces in Automatic Security Protocol Analysis.- Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures.- Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.- New Anonymity Notions for Identity-Based Encryption.- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption.- Writing an OS Kernel in a Strictly and Statically Typed Language.