The author investigates proofs of correctness of realistic
security protocols in a formal, intuitive setting. The protocols
examined include Kerberos versions, smartcard protocols,
non-repudiation protocols, and certified email protocols. The
method of analysis turns out to be both powerful and flexible. This
research advances significant extensions to the method of analysis,
while the findings on the protocols analysed are novel and
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!