Operational Semantics and Verification of Security Protocols
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Com...
Κύριοι συγγραφείς: | Cremers, Cas (Συγγραφέας), Mauw, Sjouke (Συγγραφέας) |
---|---|
Συγγραφή απο Οργανισμό/Αρχή: | SpringerLink (Online service) |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2012.
|
Σειρά: | Information Security and Cryptography,
|
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Παρόμοια τεκμήρια
-
Human Aspects of Information Security, Privacy and Trust 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings /
Έκδοση: (2017) -
Developing Ambient Intelligence Proceedings of the First International Conference on Ambient Intelligence Developments (AmID’06) /
ανά: Maña, Antonio, κ.ά.
Έκδοση: (2006) -
Security in E-Learning
ανά: Weippl, Edgar
Έκδοση: (2005) -
Ad Hoc Networks First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers /
Έκδοση: (2010) -
Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation /
ανά: Schneider, Thomas
Έκδοση: (2012)