Bruce Schneier
Secrets & lies
The CSP Approach
Steve Morgan, Di Freeze
Women Know Cyber
The CSP Approach
The Modelling and Analysis of Security Protocols
The CSP Approach
Peter Ryan
Steve A. Schneider
description
An introduction to CSP - Modelling security protocols in CSP - Expressing protocol goals - Overview of FDR - Casper - Encoding protocols and intruders for FDR - Theorem proving - Simplifying transformations - Other approaches - Prospects and wider issues.
read more
pages
314
Year published
2001
Publisher
Addison-Wesley Professional
Issn
0-201-67471-8
Language
en
categories
id
C.2.2 RYA01