Formal models and techniques for analyzing security protocols
Saved in:
| Corporate Author: | |
|---|---|
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Washington, D.C. :
IOS Press,
2011.
|
| Series: | Cryptology and information security series ;
v. 5. |
| Subjects: | |
| Online Access: | An electronic book accessible through the World Wide Web; click to view |
| Tags: |
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 a 4500 | ||
|---|---|---|---|
| 001 | 0000140994 | ||
| 005 | 20171002061713.0 | ||
| 006 | m u | ||
| 007 | cr cn||||||||| | ||
| 008 | 110222s2011 dcua sb 001 0 eng d | ||
| 010 | |z 2011923591 | ||
| 020 | |z 9781607507130 (hardcover) | ||
| 020 | |z 9781607507147 (e-book) | ||
| 035 | |a (CaPaEBR)ebr10506344 | ||
| 035 | |a (OCoLC)758834764 | ||
| 040 | |a CaPaEBR |c CaPaEBR | ||
| 050 | 1 | 4 | |a QA76.9.A25 |b F67 2011eb |
| 245 | 0 | 0 | |a Formal models and techniques for analyzing security protocols |h [electronic resource] / |c edited by Véronique Cortier and Steve Kremer. |
| 260 | |a Washington, D.C. : |b IOS Press, |c 2011. | ||
| 300 | |a vii, 303 p. : |b ill. | ||
| 490 | 1 | |a Cryptology and information security series, |x 1871-6431 ; |v v. 5 | |
| 504 | |a Includes bibliographical references and index. | ||
| 533 | |a Electronic reproduction. |b Palo Alto, Calif. : |c ebrary, |d 2013. |n Available via World Wide Web. |n Access may be limited to ebrary affiliated libraries. | ||
| 650 | 0 | |a Computer security. | |
| 655 | 7 | |a Electronic books. |2 local | |
| 710 | 2 | |a ebrary, Inc. | |
| 830 | 0 | |a Cryptology and information security series ; |v v. 5. | |
| 856 | 4 | 0 | |u http://site.ebrary.com/lib/daystar/Doc?id=10506344 |z An electronic book accessible through the World Wide Web; click to view |
| 908 | |a 170314 | ||
| 942 | 0 | 0 | |c EB |
| 999 | |c 130143 |d 130143 | ||