Operational semantics and verification of security protocols /
<p>Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correct...
Spremljeno u:
Glavni autor: | Cremers, Cas (Autor) |
---|---|
Autor kompanije: | SpringerLink (Online service) |
Daljnji autori: | Mauw, Sjouke |
Format: | e-knjiga |
Jezik: | English |
Izdano: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2012.
|
Serija: | Information Security and Cryptography
|
Teme: | |
Online pristup: | Click here to view the full text content |
Oznake: |
Dodaj oznaku
Bez oznaka, Budi prvi tko označuje ovaj zapis!
|
Similar Items
-
Operational semantics and verification of security protocols /
od: Cremers, Cas
Izdano: (2012) -
Operational semantics and verification of security protocols
od: Cremers, Cas
Izdano: (2012) -
Operational semantics and verification of security protocols
od: Cremers, Cas
Izdano: (2012) -
Cryptographic protocol : security analysis based on trusted freshness /
od: Dong, Ling
Izdano: (2012) -
Engineering secure two-party computation protocols : Design, optimization, and applications of efficient secure function evaluation /
od: Schneider, Thomas
Izdano: (2012)