Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer |
Pubbl/distr/stampa | Washington, D.C., : IOS Press, 2011 |
Descrizione fisica | 1 online resource (312 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CortierVéronique
KremerSteve |
Collana | Cryptology and information security series |
Soggetto topico | Computer security |
ISBN |
6613289612
1-283-28961-X 9786613289612 1-60750-714-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author Index |
Record Nr. | UNINA-9910781756303321 |
Washington, D.C., : IOS Press, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer |
Pubbl/distr/stampa | Washington, D.C., : IOS Press, 2011 |
Descrizione fisica | 1 online resource (312 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
CortierVéronique
KremerSteve |
Collana | Cryptology and information security series |
Soggetto topico | Computer security |
ISBN |
6613289612
1-283-28961-X 9786613289612 1-60750-714-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author Index |
Record Nr. | UNINA-9910828353003321 |
Washington, D.C., : IOS Press, 2011 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|