Related Books

Operational Semantics and Verification of Security Protocols
Language: en
Pages: 176
Authors: Cas Cremers
Categories: Computers
Type: BOOK - Published: 2012-10-30 - Publisher: Springer Science & Business Media

GET EBOOK

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptogr
Security Protocols
Language: en
Pages: 360
Authors: Bruce Christianson
Categories: Business & Economics
Type: BOOK - Published: 2005-09-05 - Publisher: Springer Science & Business Media

GET EBOOK

This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Security Protocols, held in Cambridge, UK, in April 2003. T
Internet Security Protocols
Language: en
Pages: 286
Authors: Uyless D. Black
Categories: Computer networks
Type: BOOK - Published: 1982 - Publisher:

GET EBOOK

Protocols for Authentication and Key Establishment
Language: en
Pages: 343
Authors: Colin Boyd
Categories: Computers
Type: BOOK - Published: 2013-03-09 - Publisher: Springer Science & Business Media

GET EBOOK

Protocols for authentication and key establishment are the foundation for security of communications. The range and diversity of these protocols is immense, whi
Security Protocols XXVI
Language: en
Pages: 315
Authors: Vashek Matyáš
Categories: Computers
Type: BOOK - Published: 2018-11-23 - Publisher: Springer

GET EBOOK

This book constitutes the thoroughly refereed post-workshop proceedings of the 26th International Workshop on Security Protocols, held in Cambridge, UK, in Marc