The modelling and analysis of security protocols the CSP approach

Saved in:
Bibliographic Details
Main Author: Ryan, Peter
Other Authors: Schneider, Steven
Format: Book
Published: Harlow, England Addison-Wesley 2001
Subjects:
Online Access:Click Here to View Status and Holdings.
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000n a2200000 a 4501
001 wils-292075
020 # # |a 0201674718 
090 0 0 |a QA76.9.A25  |b R93 2001 
100 1 # |a Ryan, Peter 
245 1 1 |a The modelling and analysis of security protocols  |b the CSP approach  |c P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe 
260 # # |a Harlow, England  |b Addison-Wesley  |c 2001 
300 # # |a xiv, 300 p.  |b ill.  |c 23 cm 
504 # # |a Includes bibliographical references and index 
650 # 0 |a Computer software  |x Verification 
650 # 0 |a Computer network protocols 
650 # 0 |a Computer security  |x Mathematical models 
650 # 0 |a Computer networks  |x Security measures 
700 1 # |a Schneider, Steven 
856 4 0 |z Click Here to View Status and Holdings.  |u https://opac.uitm.edu.my/opac/detailsPage/detailsHome.jsp?tid=292075 
964 # # |c BOK  |d 01 
040 # # |a Shah Alam