Amazon cover image
Image from Amazon.com

Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer.

Contributor(s): Material type: TextTextSeries: Cryptology and information security series ; v. 5.Publication details: Amsterdam ; Da Washington, DC : IOS Press, ©2011.Description: 1 online resource (vii, 303 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781607507147
  • 1607507145
  • 1607507137
  • 9781607507130
Subject(s): Genre/Form: Additional physical formats: Print version:: Formal models and techniques for analyzing security protocols.DDC classification:
  • 005.8 23
LOC classification:
  • QA76.9.A25 F654 2011
Online resources:
Contents:
Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index.
Summary: Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro.
Item type:
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Home library Collection Call number Materials specified Status Date due Barcode
Electronic-Books Electronic-Books OPJGU Sonepat- Campus E-Books EBSCO Available

Includes bibliographical references and index.

Print version record.

Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness -- The Case of Diffie-Hellman Keys; Author Index.

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure networks like the internet, they are notoriously difficult to devise. The field of symbolic analysis of security protocols has seen significant advances during the last few years. There is now a better understanding of decidability and complexity questions and successful automated tools for the pro.

eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - Worldwide

There are no comments on this title.

to post a comment.

O.P. Jindal Global University, Sonepat-Narela Road, Sonepat, Haryana (India) - 131001

Send your feedback to glus@jgu.edu.in

Hosted, Implemented & Customized by: BestBookBuddies   |   Maintained by: Global Library