02943nam 2200589 a 450 991082835300332120230725051419.066132896121-283-28961-X97866132896121-60750-714-5(CKB)2550000000050095(EBL)784604(OCoLC)756484738(SSID)ssj0000590482(PQKBManifestationID)12179840(PQKBTitleCode)TC0000590482(PQKBWorkID)10671611(PQKB)10192034(MiAaPQ)EBC784604(Au-PeEL)EBL784604(CaPaEBR)ebr10506344(CaONFJC)MIL328961(EXLCZ)99255000000005009520110222d2011 uy 0engur|n|---|||||txtccrFormal models and techniques for analyzing security protocols[electronic resource] /edited by Véronique Cortier and Steve KremerWashington, D.C. IOS Press20111 online resource (312 p.)Cryptology and information security series,1871-6431 ;v. 5Description based upon print version of record.1-60750-713-7 Includes bibliographical references and index.Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author IndexSecurity protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the proCryptology and information security series ;v. 5.Computer securityComputer security.005.8Cortier Véronique606143Kremer Steve1626340MiAaPQMiAaPQMiAaPQBOOK9910828353003321Formal models and techniques for analyzing security protocols3962294UNINA