Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

The modelling and analysis of security protocolsThe modelling and analysis of security protocols

The modelling and analysis of security protocols2001

Bill Roscoe, Peter Ryan PhD, S. A. Schneider, A.W. Roscoe, Gavin Lowe, P. Y. A. Ryan, G. Lowe, M. H. Goldsmith

Details

First published
2001
OL Work ID
OL13571125W

Subjects

Mathematical modelsComputersComputer securityCryptographyAccess controlComputer networks, security measuresComputer network protocolsComputer networksSecurity measuresComputer softwareVerificationComputer networks--security measuresComputer security--mathematical modelsComputer software--verificationComputers--access controlQa76.9.a25 r93 2001Tk5105.59 .r93 2001

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.