The modelling and analysis of security protocols

The modelling and analysis of security protocols2001
Bill Roscoe, Peter Ryan PhD, S. A. Schneider, A.W. Roscoe, Gavin Lowe, P. Y. A. Ryan, G. Lowe, M. H. Goldsmith
Details
- First published
- 2001
- OL Work ID
- OL13571125W
Subjects
Mathematical modelsComputersComputer securityCryptographyAccess controlComputer networks, security measuresComputer network protocolsComputer networksSecurity measuresComputer softwareVerificationComputer networks--security measuresComputer security--mathematical modelsComputer software--verificationComputers--access controlQa76.9.a25 r93 2001Tk5105.59 .r93 2001