The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
Or split into 4x interest-free payments of 25% on orders over R50
Learn more
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
Imprint | Springer-Verlag |
Country of origin | Germany |
Series | Information Security and Cryptography |
Release date | March 2007 |
Availability | Expected to ship within 10 - 15 working days |
First published | 2007 |
Authors | Giampaolo Bella |
Dimensions | 235 x 155 x 17mm (L x W x T) |
Format | Hardcover |
Pages | 274 |
Edition | 2007 ed. |
ISBN-13 | 978-3-540-68134-2 |
Barcode | 9783540681342 |
Categories | |
LSN | 3-540-68134-5 |