in the UK
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
Springer-Verlag Berlin and Heidelberg GmbH & Co. K
This book can be found in...
The prices displayed are for website purchases only, and may differ to the prices in Waterstones shops.