View PDF

Download Links

by Comp Week (s , Ihor Kuz , Felix Rauch , Manuel M. T. Chakravarty , Gernot Heiser

Active Bibliography

828 A calculus for cryptographic protocols: The spi calculus – Martin Abadi, Andrew D. Gordon - 1999
1213 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990
642 Breaking and Fixing the Needham-Schroeder Public-Key Protocol using FDR – Gavin Lowe - 1996
470 Authentication in distributed systems: Theory and practice – Butler Lampson, Martín Abadi, Michael Burrows, Edward Wobber - 1992
Publication Date: 01/01/96 Search this book: – Publisher John Wiley, Author(s) Bruce Schneier, Foreword Whitfield Diffie
861 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
554 Pervasive Computing: Vision and Challenges – M. Satyanarayanan - 2001
1132 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
544 Data Security – Dorothy E. Denning, Peter J. Denning - 1979