Operational semantics and verification of security protocols /
<p>Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correct...
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Berlin, Heidelberg
Springer Berlin Heidelberg
2012.
|
Series: | Information Security and Cryptography
|
Subjects: | |
Online Access: | Click here to view the full text content |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Search Result 1
Search Result 2
Search Result 3