Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book

Title Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer.

Publication Info. Amsterdam ; da Washington, DC : IOS Press, [2011]
©2011

Item Status

Description 1 online resource (vii, 303 pages) : illustrations.
Physical Medium polychrome
Description text file
Series Cryptology and information security series ; v. 5
Cryptology and information security series ; v. 5.
Bibliography Includes bibliographical references and index.
Contents Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index.
Summary Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Computer security.
Computer security.
Computers -- Access control.
Computers -- Access control.
Computer networks -- Security measures.
Computer networks -- Security measures.
Electronic information resources -- Access control.
Electronic information resources -- Access control.
Genre/Form Electronic books.
Electronic books.
Added Author Cortier, Véronique.
Kremer, Steve.
IOS Press.
Other Form: Print version: Formal models and techniques for analyzing security protocols. Amsterdam ; da Washington, DC : IOS Press, ©2011 9781607507130 (OCoLC)705518947
ISBN 9781607507147 (electronic book)
1607507145 (electronic book)