Formal models and techniques for analyzing security protocols

Saved in:
Bibliographic Details
Corporate Author: ebrary, Inc
Format: Electronic eBook
Language:English
Published: Washington, D.C. : IOS Press, 2011.
Series:Cryptology and information security series ; v. 5.
Subjects:
Online Access:An electronic book accessible through the World Wide Web; click to view
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 a 4500
001 0000140994
005 20171002061713.0
006 m u
007 cr cn|||||||||
008 110222s2011 dcua sb 001 0 eng d
010 |z  2011923591 
020 |z 9781607507130 (hardcover) 
020 |z 9781607507147 (e-book) 
035 |a (CaPaEBR)ebr10506344 
035 |a (OCoLC)758834764 
040 |a CaPaEBR  |c CaPaEBR 
050 1 4 |a QA76.9.A25  |b F67 2011eb 
245 0 0 |a Formal models and techniques for analyzing security protocols  |h [electronic resource] /  |c edited by Véronique Cortier and Steve Kremer. 
260 |a Washington, D.C. :  |b IOS Press,  |c 2011. 
300 |a vii, 303 p. :  |b ill. 
490 1 |a Cryptology and information security series,  |x 1871-6431 ;  |v v. 5 
504 |a Includes bibliographical references and index. 
533 |a Electronic reproduction.  |b Palo Alto, Calif. :  |c ebrary,  |d 2013.  |n Available via World Wide Web.  |n Access may be limited to ebrary affiliated libraries. 
650 0 |a Computer security. 
655 7 |a Electronic books.  |2 local 
710 2 |a ebrary, Inc. 
830 0 |a Cryptology and information security series ;  |v v. 5. 
856 4 0 |u http://site.ebrary.com/lib/daystar/Doc?id=10506344  |z An electronic book accessible through the World Wide Web; click to view 
908 |a 170314 
942 0 0 |c EB 
999 |c 130143  |d 130143