•  Retrait en 2 heures
  •  Assortiment impressionnant
  •  Paiement sécurisé
  •  Toujours un magasin près de chez vous
  •  Retrait gratuit dans votre magasin Club
  •  7.000.0000 titres dans notre catalogue
  •  Payer en toute sécurité
  •  Toujours un magasin près de chez vous

Security Protocols and Threat Models

Security and Privacy Via the Applied ����-Calculus

Reynaldo Gil-Pons, Ross Horne, Sjouke Mauw, Felix Stutz, Semen Yurkov
Livre relié | Anglais | Information Security and Cryptography
106,95 €
+ 213 points
Pré-commander, date de disponibilité inconnue
Passer une commande en un clic
Payer en toute sécurité
Livraison en Belgique: 3,99 €
Livraison en magasin gratuite

Description

Protocols connect the many devices used in our personal and professional lives.  Hence we require assurances that they are secure in the face of threats.

Security is too important to leave to intuition and experience alone. We need methodologies to precisely determine our security goals. A security property is one that holds despite the best efforts of an attacker, as captured by a threat model. When attacking a protocol, an eavesdropper may inject messages leading to sessions being hijacked and other data breaches.

This textbook goes from intuition, to theory, to tools, explaining different security properties. Ubiquitous protocols keep the discussion real:  ePassport protocols used at border checkpoints; the EMV protocol for contactless payments; and Open ID Connect used to sign in to websites. Even threats enabling car theft via relay attacks are taken into consideration by authenticating proximity. The book also analyses threats to privacy such as tracking, mitigated by making sessions unlinkable.

Topics and features:

  • The learning curve brings readers to the edge of the topic of security protocols.
  • Multiple security and privacy properties and threats are expressed in a core calculus.
  • Large real-world case studies showcase the methods in practice.
  • The theory informs the accurate usage of tools for checking security protocols.
  • Minimal protocols are selected to cleanly illustrate new concepts.

This textbook is designed to take readers with some grounding in computer science to the edge of the field of security protocols. Additionally, it can serve as a highly useful reference for established researchers and security professionals branching out into threat modelling.

Reynaldo Gil-Pons, Felix Stutz and Semen Yurkov were postdoctoral researchers in the Security and Trust of Software Systems group headed by Sjouke Mauw, professor at University of Luxembourg. Ross Horne directs the Cyber Security MSc at University of Strathclyde, UK.

Spécifications

Parties prenantes

Auteur(s) :
Editeur:

Contenu

Nombre de pages :
228
Langue:
Anglais
Collection :

Caractéristiques

EAN:
9783032082480
Date de parution :
29-11-25
Format:
Livre relié
Format numérique:
Genaaid
Dimensions :
155 mm x 235 mm
Librairie Club

Seulement chez Librairie Club

+ 213 points sur votre carte client de Librairie Club
CADEAU

Ticket de cinéma offert

à l'achat d'un Bongo à partir de 39 €
CADEAU
Ticket de cinéma offert
CONCOURS

Uniquement dans nos magasins : gagnez un voyage à Prague

à l'achat du nouveau Dan Brown
CONCOURS
Gagnez un voyage à Prague
RÉDUCTION

50% de réduction

sur une sélection de papeterie
RÉDUCTION
50% de réduction sur une sélection de papeterie
Standaard Boekhandel

Les avis

Nous publions uniquement les avis qui respectent les conditions requises. Consultez nos conditions pour les avis.