Operational Semantics and Verification of Security Protocols

Author:   Cas Cremers ,  Sjouke Mauw
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2012 ed.
ISBN:  

9783642430534


Pages:   174
Publication Date:   09 November 2014
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $184.67 Quantity:  
Add to Cart

Share |

Operational Semantics and Verification of Security Protocols


Add your own review!

Overview

Full Product Details

Author:   Cas Cremers ,  Sjouke Mauw
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2012 ed.
Dimensions:   Width: 15.50cm , Height: 1.00cm , Length: 23.50cm
Weight:   0.454kg
ISBN:  

9783642430534


ISBN 10:   3642430538
Pages:   174
Publication Date:   09 November 2014
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.
Language:   English

Table of Contents

Reviews

This book is a great resource for anyone who wants to do research in the security analysis of protocols. It is written in a textbook style by authors who have excellent command over the subject. It could be used for self-study too ... overall the book does superb justice to the subject in every aspect. [Sashank Dara, Cisco Systems Inc., IACR Book Reviews, 12/2014]


This book is a great resource for anyone who wants to do research in the security analysis of protocols. It is written in a textbook style by authors who have excellent command over the subject. It could be used for self-study too ... overall the book does superb justice to the subject in every aspect. [Sashank Dara, Cisco Systems Inc., IACR Book Reviews, 12/2014]


Author Information

The first author is a senior scientist working at the ETH Zürich, the second author is a professor at the Université du Luxembourg; both have a research focus and teaching responsibilities in the areas of information security, protocols, privacy, trust and formal methods.  

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List