This book constitutes the refereed proceedings of the 13th European Symposium on Research in Computer Security, ESORICS 2008, ...
Lire la suiteThe author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols ...
Lire la suite“Hardening” is the process of protecting a system and its applications against unknown threats. Hardening Linux identifies ...
Lire la suite