Related Books

Operational Semantics and Verification of Security Protocols
Language: en
Pages: 176
Authors: Cas Cremers
Categories: Computers
Type: BOOK - Published: 2012-10-30 - Publisher: Springer Science & Business Media

GET EBOOK

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptogr
Foundations of Security, Protocols, and Equational Reasoning
Language: en
Pages: 250
Authors: Joshua D. Guttman
Categories: Computers
Type: BOOK - Published: 2019-05-17 - Publisher: Springer

GET EBOOK

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Frede
Secure Multi-Party E-Commerce Protocols
Language: en
Pages: 109
Authors: Cătălin V. Bîrjoveanu
Categories: Computers
Type: BOOK - Published: 2022-06-30 - Publisher: Springer Nature

GET EBOOK

This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physi
Computer Networks
Language: en
Pages: 458
Authors: Piotr Gaj
Categories: Computers
Type: BOOK - Published: 2018-06-05 - Publisher: Springer

GET EBOOK

This book constitutes the thoroughly refereed proceedings of the 25th International Conference on Computer Networks, CN 2018, held in Gliwice, Poland, in June 2
Computer Security Handbook, Set
Language: en
Pages: 2353
Authors: Seymour Bosworth
Categories: Business & Economics
Type: BOOK - Published: 2014-03-24 - Publisher: John Wiley & Sons

GET EBOOK

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immed