Operational semantics and verification of security protocols /

<p>Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correct...

Full description

Saved in:
Bibliographic Details
Main Author: Cremers, Cas (Author)
Corporate Author: SpringerLink (Online service)
Other Authors: Mauw, Sjouke
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2012.
Series:Information Security and Cryptography
Subjects:
Online Access:Click here to view the full text content
Tags: Add Tag
No Tags, Be the first to tag this record!

System Under Maintenance

Our Library Management System is currently under maintenance.

Holdings and item availability information is currently unavailable. Please accept our apologies for any inconvenience this may cause and contact us for further assistance:

david@pintaran.my

Internet

Click here to view the full text content