Coverart for item
The Resource The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe

The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe

Label
The modelling and analysis of security protocols : the CSP approach
Title
The modelling and analysis of security protocols
Title remainder
the CSP approach
Statement of responsibility
P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Title variation
Security protocols
Creator
Contributor
Subject
Language
eng
Cataloging source
OX/U-1
http://library.link/vocab/creatorName
Ryan, Peter
Index
no index present
Literary form
non fiction
http://library.link/vocab/relatedWorkOrContributorName
Schneider, S. A.
http://library.link/vocab/subjectName
  • Computer security
  • Computer networks
  • Computer network protocols
Label
The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Instantiates
Publication
Note
  • Only first two authors named on cover, as: Peter Ryan and Steve Schneider
  • Security protocols
Bibliography note
Includes bibliographical references (pages 285-291) and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Preface
  • Introduction.
  • p. 1
  • 1.
  • Introduction to CSP.
  • p. 41
  • 2.
  • Modelling security protocols in CSP.
  • p. 77
  • 3.
  • Expressing protocol goals.
  • p. 93
  • 4.
  • Overview of FDR.
  • p. 125
  • 5.
  • Casper.
  • p. 141
  • 6.
  • Encoding protocols and intruders for FDR.
  • p. 161
  • 7.
  • Theorem proving.
  • p. 175
  • 8.
  • Simplifying transformations.
  • p. 201
  • 9.
  • Other approaches.
  • p. 221
  • 10.
  • Prospects and wider issues.
  • p. 237
  • A.
  • Background cryptography.
  • p. 245
  • B.
  • Yahalom protocol in Casper.
  • p. 253
  • C.
  • CyberCash rank function analysis.
  • p. 269
  • Bibliography.
  • p. 285
  • Notation.
  • p. 293
  • Index.
  • p. 295
Control code
b90201674718
Dimensions
24 cm.
Extent
xiv, 300 p.
Isbn
9780201674712
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Label
The modelling and analysis of security protocols : the CSP approach, P.Y.A. Ryan and S.A. Schneider ; with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Publication
Note
  • Only first two authors named on cover, as: Peter Ryan and Steve Schneider
  • Security protocols
Bibliography note
Includes bibliographical references (pages 285-291) and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Preface
  • Introduction.
  • p. 1
  • 1.
  • Introduction to CSP.
  • p. 41
  • 2.
  • Modelling security protocols in CSP.
  • p. 77
  • 3.
  • Expressing protocol goals.
  • p. 93
  • 4.
  • Overview of FDR.
  • p. 125
  • 5.
  • Casper.
  • p. 141
  • 6.
  • Encoding protocols and intruders for FDR.
  • p. 161
  • 7.
  • Theorem proving.
  • p. 175
  • 8.
  • Simplifying transformations.
  • p. 201
  • 9.
  • Other approaches.
  • p. 221
  • 10.
  • Prospects and wider issues.
  • p. 237
  • A.
  • Background cryptography.
  • p. 245
  • B.
  • Yahalom protocol in Casper.
  • p. 253
  • C.
  • CyberCash rank function analysis.
  • p. 269
  • Bibliography.
  • p. 285
  • Notation.
  • p. 293
  • Index.
  • p. 295
Control code
b90201674718
Dimensions
24 cm.
Extent
xiv, 300 p.
Isbn
9780201674712
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n

Library Locations

    • Brunswick Library StoreBorrow it
      Liverpool, GB
Processing Feedback ...