The Modelling and Analysis of Security Protocols The CSP Approach

Sign up to use
An introduction to CSP - Modelling security protocols in CSP - Expressing protocol goals - Overview of FDR - Casper - Encoding protocols and intruders for FDR - Theorem proving - Simplifying transformations - Other approaches - Prospects and wider issues.

No reviews yet.
Be the first to write one.

No highlights yet.
Be the first to share one.