Operational Semantics and Verification of Security Protocols
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Com...
Main Authors: | Cremers, Cas (Author), Mauw, Sjouke (Author) |
---|---|
Corporate Author: | SpringerLink (Online service) |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2012.
|
Series: | Information Security and Cryptography,
|
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Similar Items
-
Human Aspects of Information Security, Privacy and Trust 5th International Conference, HAS 2017, Held as Part of HCI International 2017, Vancouver, BC, Canada, July 9-14, 2017, Proceedings /
Published: (2017) -
Developing Ambient Intelligence Proceedings of the First International Conference on Ambient Intelligence Developments (AmID’06) /
by: Maña, Antonio, et al.
Published: (2006) -
Security in E-Learning
by: Weippl, Edgar
Published: (2005) -
Ad Hoc Networks First International Conference, ADHOCNETS 2009, Niagara Falls, Ontario, Canada, September 22-25, 2009. Revised Selected Papers /
Published: (2010) -
Engineering Secure Two-Party Computation Protocols Design, Optimization, and Applications of Efficient Secure Function Evaluation /
by: Schneider, Thomas
Published: (2012)