The Resource The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Resource Information
The item The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.This item is available to borrow from 1 library branch.
Resource Information
The item The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Liverpool.
This item is available to borrow from 1 library branch.
- Language
- eng
- Extent
- xiv, 300 p.
- Note
-
- Only first two authors named on cover, as: Peter Ryan and Steve Schneider
- Security protocols
- Contents
-
- Preface
- Introduction.
- p. 1
- 1.
- Introduction to CSP.
- p. 41
- 2.
- Modelling security protocols in CSP.
- p. 77
- 3.
- Expressing protocol goals.
- p. 93
- 4.
- Overview of FDR.
- p. 125
- 5.
- Casper.
- p. 141
- 6.
- Encoding protocols and intruders for FDR.
- p. 161
- 7.
- Theorem proving.
- p. 175
- 8.
- Simplifying transformations.
- p. 201
- 9.
- Other approaches.
- p. 221
- 10.
- Prospects and wider issues.
- p. 237
- A.
- Background cryptography.
- p. 245
- B.
- Yahalom protocol in Casper.
- p. 253
- C.
- CyberCash rank function analysis.
- p. 269
- Bibliography.
- p. 285
- Notation.
- p. 293
- Index.
- p. 295
- Isbn
- 9780201674712
- Label
- The modelling and analysis of security protocols : the CSP approach
- Title
- The modelling and analysis of security protocols
- Title remainder
- the CSP approach
- Statement of responsibility
- P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
- Title variation
- Security protocols
- Language
- eng
- Cataloging source
- OX/U-1
- http://library.link/vocab/creatorName
- Ryan, Peter
- Index
- no index present
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
- Schneider, S. A.
- http://library.link/vocab/subjectName
-
- Computer security
- Computer networks
- Computer network protocols
- Label
- The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
- Note
-
- Only first two authors named on cover, as: Peter Ryan and Steve Schneider
- Security protocols
- Bibliography note
- Includes bibliographical references (pages 285-291) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Preface
- Introduction.
- p. 1
- 1.
- Introduction to CSP.
- p. 41
- 2.
- Modelling security protocols in CSP.
- p. 77
- 3.
- Expressing protocol goals.
- p. 93
- 4.
- Overview of FDR.
- p. 125
- 5.
- Casper.
- p. 141
- 6.
- Encoding protocols and intruders for FDR.
- p. 161
- 7.
- Theorem proving.
- p. 175
- 8.
- Simplifying transformations.
- p. 201
- 9.
- Other approaches.
- p. 221
- 10.
- Prospects and wider issues.
- p. 237
- A.
- Background cryptography.
- p. 245
- B.
- Yahalom protocol in Casper.
- p. 253
- C.
- CyberCash rank function analysis.
- p. 269
- Bibliography.
- p. 285
- Notation.
- p. 293
- Index.
- p. 295
- Control code
- b90201674718
- Dimensions
- 24 cm.
- Extent
- xiv, 300 p.
- Isbn
- 9780201674712
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Label
- The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
- Note
-
- Only first two authors named on cover, as: Peter Ryan and Steve Schneider
- Security protocols
- Bibliography note
- Includes bibliographical references (pages 285-291) and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Preface
- Introduction.
- p. 1
- 1.
- Introduction to CSP.
- p. 41
- 2.
- Modelling security protocols in CSP.
- p. 77
- 3.
- Expressing protocol goals.
- p. 93
- 4.
- Overview of FDR.
- p. 125
- 5.
- Casper.
- p. 141
- 6.
- Encoding protocols and intruders for FDR.
- p. 161
- 7.
- Theorem proving.
- p. 175
- 8.
- Simplifying transformations.
- p. 201
- 9.
- Other approaches.
- p. 221
- 10.
- Prospects and wider issues.
- p. 237
- A.
- Background cryptography.
- p. 245
- B.
- Yahalom protocol in Casper.
- p. 253
- C.
- CyberCash rank function analysis.
- p. 269
- Bibliography.
- p. 285
- Notation.
- p. 293
- Index.
- p. 295
- Control code
- b90201674718
- Dimensions
- 24 cm.
- Extent
- xiv, 300 p.
- Isbn
- 9780201674712
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/The-modelling-and-analysis-of-security-protocols/46Vl6_w3hEA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/The-modelling-and-analysis-of-security-protocols/46Vl6_w3hEA/">The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.liverpool.ac.uk/portal/The-modelling-and-analysis-of-security-protocols/46Vl6_w3hEA/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.liverpool.ac.uk/portal/The-modelling-and-analysis-of-security-protocols/46Vl6_w3hEA/">The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.liverpool.ac.uk/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.liverpool.ac.uk/">University of Liverpool</a></span></span></span></span></div>