Related Books
Language: en
Pages: 314
Pages: 314
Type: BOOK - Published: 2001 - Publisher: Addison-Wesley Professional
An introduction to CSP - Modelling security protocols in CSP - Expressing protocol goals - Overview of FDR - Casper - Encoding protocols and intruders for FDR -
Language: en
Pages: 372
Pages: 372
Type: BOOK - Published: 2020-03-17 - Publisher: John Wiley & Sons
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers
Language: en
Pages: 176
Pages: 176
Type: BOOK - Published: 2012-10-30 - Publisher: Springer Science & Business Media
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptogr
Language: en
Pages: 737
Pages: 737
Type: BOOK - Published: 2009-06-23 - Publisher: Springer
This book constitutes the refereed proceedings of the 21st International Conference on Computer Aided Verification, CAV 2009, held in Grenoble, France, in June/
Language: en
Pages:
Pages:
Type: BOOK - Published: - Publisher: