|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBOOKCENTRAL_ocn758834764 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
111027s2011 ne a ob 001 0 eng d |
040 |
|
|
|a IOSPR
|b eng
|e pn
|c IOSPR
|d N$T
|d YDXCP
|d E7B
|d CDX
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d NLGGC
|d EBLCP
|d IDEBK
|d CEF
|d OCLCQ
|d OCLCO
|d OCLCF
|d S3O
|d OCLCQ
|d AGLDB
|d ZCU
|d OCLCQ
|d MERUC
|d OCLCQ
|d U3W
|d OCLCA
|d VTS
|d ICG
|d OCLCQ
|d INT
|d VT2
|d AU@
|d OCLCQ
|d WYU
|d JBG
|d OCLCQ
|d STF
|d DKC
|d OCLCQ
|d M8D
|d OCLCQ
|d AJS
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 756484738
|a 1055385008
|a 1058000563
|a 1066430311
|a 1081185947
|a 1228530613
|
020 |
|
|
|a 9781607507147
|q (electronic bk.)
|
020 |
|
|
|a 1607507145
|q (electronic bk.)
|
020 |
|
|
|a 1607507137
|
020 |
|
|
|a 9781607507130
|
020 |
|
|
|z 9781607507130
|q (hardcover)
|
029 |
1 |
|
|a AU@
|b 000050054069
|
029 |
1 |
|
|a AU@
|b 000050608292
|
029 |
1 |
|
|a AU@
|b 000051364971
|
029 |
1 |
|
|a AU@
|b 000053277265
|
029 |
1 |
|
|a CHNEW
|b 000617108
|
029 |
1 |
|
|a DEBBG
|b BV043069098
|
029 |
1 |
|
|a DEBBG
|b BV044158422
|
029 |
1 |
|
|a DEBSZ
|b 372885748
|
029 |
1 |
|
|a DEBSZ
|b 421525630
|
029 |
1 |
|
|a DEBSZ
|b 431048029
|
029 |
1 |
|
|a GBVCP
|b 803672438
|
029 |
1 |
|
|a HEBIS
|b 299831655
|
029 |
1 |
|
|a NZ1
|b 14257067
|
035 |
|
|
|a (OCoLC)758834764
|z (OCoLC)756484738
|z (OCoLC)1055385008
|z (OCoLC)1058000563
|z (OCoLC)1066430311
|z (OCoLC)1081185947
|z (OCoLC)1228530613
|
037 |
|
|
|a 978-1-60750-714-7
|b IOS Press
|n http://www.iospress.nl
|
050 |
|
4 |
|a QA76.9.A25
|b F654 2011
|
072 |
|
7 |
|a COM053000
|x COM
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Formal models and techniques for analyzing security protocols /
|c edited by Véronique Cortier and Steve Kremer.
|
260 |
|
|
|a Amsterdam ;
|a Da Washington, DC :
|b IOS Press,
|c ©2011.
|
300 |
|
|
|a 1 online resource (vii, 303 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cryptology and information security series ;
|v v. 5
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index.
|
520 |
|
|
|a Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computers
|x Access control.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Electronic information resources
|x Access control.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Ordinateurs
|x Accès
|x Contrôle.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sources d'information électroniques
|x Accès
|x Contrôle.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Computers
|x Access control
|2 fast
|
650 |
|
7 |
|a Electronic information resources
|x Access control
|2 fast
|
700 |
1 |
|
|a Cortier, Véronique.
|
700 |
1 |
|
|a Kremer, Steve.
|
710 |
2 |
|
|a IOS Press.
|
758 |
|
|
|i has work:
|a Formal models and techniques for analyzing security protocols (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFC8HHcqTCHpPqf4wbHcj3
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|t Formal models and techniques for analyzing security protocols.
|d Amsterdam ; da Washington, DC : IOS Press, ©2011
|z 9781607507130
|w (OCoLC)705518947
|
830 |
|
0 |
|a Cryptology and information security series ;
|v v. 5.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=784604
|z Texto completo
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 19558387
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL784604
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10506344
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 395231
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 328961
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 3639903
|
994 |
|
|
|a 92
|b IZTAP
|