Operational semantics and verification of security protocols /

<p>Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correct...

Cijeli opis

Spremljeno u:
Bibliografski detalji
Glavni autor: Cremers, Cas (Autor)
Autor kompanije: SpringerLink (Online service)
Daljnji autori: Mauw, Sjouke
Format: e-knjiga
Jezik:English
Izdano: Berlin, Heidelberg Springer Berlin Heidelberg 2012.
Serija:Information Security and Cryptography
Teme:
Online pristup:Click here to view the full text content
Oznake: Dodaj oznaku
Bez oznaka, Budi prvi tko označuje ovaj zapis!

Similar Items