Foundations and Practice of Security 7th International Symposium, FPS 2014, Montreal, QC, Canada, November 3-5, 2014. Revised Selected Papers / [electronic resource] :
edited by Fr�ed�eric Cuppens, Joaquin Garcia-Alfaro, Nur Zincir Heywood, Philip W. L. Fong.
- XIII, 375 p. 98 illus. online resource.
- Lecture Notes in Computer Science, 8930 0302-9743 ; .
- Lecture Notes in Computer Science, 8930 .
Privacy -- Software security and malware analysis -- Network security and protocols -- Access control models and policy analysis -- Protocol verification -- Cryptographic technologies.
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.
9783319170404
10.1007/978-3-319-17040-4 doi
Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
QA76.9.A25
005.82
Privacy -- Software security and malware analysis -- Network security and protocols -- Access control models and policy analysis -- Protocol verification -- Cryptographic technologies.
This book constitutes the thoroughly refereed post-proceedings of the 7th Symposium on Foundations and Practice of Security, FPS 2014, held in Montreal, QC, Canada, in November 2014. The 18 revised full papers presented together with 5 short papers and 2 position papers were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on privacy; software security and malware analysis; network security and protocols; access control models and policy analysis; protocol verification; and cryptographic technologies.
9783319170404
10.1007/978-3-319-17040-4 doi
Computer science.
Computer security.
Data encryption (Computer science).
Coding theory.
Computer Science.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
QA76.9.A25
005.82