Operational Semantics and Verification of Security Protocols
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Com...
Clasificación: | Libro Electrónico |
---|---|
Autores principales: | Cremers, Cas (Autor), Mauw, Sjouke (Autor) |
Autor Corporativo: | SpringerLink (Online service) |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2012.
|
Edición: | 1st ed. 2012. |
Colección: | Information Security and Cryptography,
|
Temas: | |
Acceso en línea: | Texto Completo |
Ejemplares similares
-
Synchronizing Internet Protocol Security (SIPSec)
por: Shoniregun, Charles A.
Publicado: (2007) -
Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation /
por: Schneider, Thomas
Publicado: (2012) -
Secure Smart Embedded Devices, Platforms and Applications
Publicado: (2014) -
Secure Multi-Party Non-Repudiation Protocols and Applications
por: Onieva, José A., et al.
Publicado: (2009) -
Distributed Computing 30th International Symposium, DISC 2016, Paris, France, September 27-29, 2016. Proceedings /
Publicado: (2016)