top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer
Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer
Pubbl/distr/stampa Washington, D.C., : IOS Press, 2011
Descrizione fisica 1 online resource (312 p.)
Disciplina 005.8
Altri autori (Persone) CortierVéronique
KremerSteve
Collana Cryptology and information security series
Soggetto topico Computer security
ISBN 6613289612
1-283-28961-X
9786613289612
1-60750-714-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author Index
Record Nr. UNINA-9910781756303321
Washington, D.C., : IOS Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer
Formal models and techniques for analyzing security protocols [[electronic resource] /] / edited by Véronique Cortier and Steve Kremer
Pubbl/distr/stampa Washington, D.C., : IOS Press, 2011
Descrizione fisica 1 online resource (312 p.)
Disciplina 005.8
Altri autori (Persone) CortierVéronique
KremerSteve
Collana Cryptology and information security series
Soggetto topico Computer security
ISBN 6613289612
1-283-28961-X
9786613289612
1-60750-714-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness - The Case of Diffie-Hellman Keys; Author Index
Record Nr. UNINA-9910828353003321
Washington, D.C., : IOS Press, 2011
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui