Formal Correctness of Security Protocols With 62 Figures and 4 Tables /
Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of c...
| Main Author: | Bella, Giampaolo (Author) |
|---|---|
| Corporate Author: | SpringerLink (Online service) |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2007.
|
| Series: | Information Security and Cryptography, Texts and Monographs,
|
| Subjects: | |
| Online Access: | Full Text via HEAL-Link |
Similar Items
-
Information Science and Applications (ICISA) 2016
Published: (2016) -
Reliability, Safety, and Security of Railway Systems. Modelling, Analysis, Verification, and Certification First International Conference, RSSRail 2016, Paris, France, June 28-30, 2016, Proceedings /
Published: (2016) -
Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings /
Published: (2009) -
Physical-Layer Security for Cooperative Relay Networks
by: Zou, Yulong, et al.
Published: (2016) -
Mobile Web and Intelligent Information Systems 14th International Conference, MobiWIS 2017, Prague, Czech Republic, August 21-23, 2017, Proceedings /
Published: (2017)