Operational Semantics and Verification of Security Protocols

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Com...

Full description

Bibliographic Details
Main Authors: Cremers, Cas (Author), Mauw, Sjouke (Author)
Corporate Author: SpringerLink (Online service)
Format: Electronic eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2012.
Series:Information Security and Cryptography,
Subjects:
Online Access:Full Text via HEAL-Link

Similar Items