Modelling and analysis of security protocols
Main Authors: | , , , , |
---|---|
Format: | Book |
Published: |
Addison−Wesley
2001
|
_version_ | 1797079283100811264 |
---|---|
author | Ryan, P Schneider, S Goldsmith, M Lowe, G Roscoe, B |
author_facet | Ryan, P Schneider, S Goldsmith, M Lowe, G Roscoe, B |
author_sort | Ryan, P |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T00:43:36Z |
format | Book |
id | oxford-uuid:83e0d99d-8644-403f-85d6-089c18b8e770 |
institution | University of Oxford |
last_indexed | 2024-03-07T00:43:36Z |
publishDate | 2001 |
publisher | Addison−Wesley |
record_format | dspace |
spelling | oxford-uuid:83e0d99d-8644-403f-85d6-089c18b8e7702022-03-26T21:47:16ZModelling and analysis of security protocolsBookhttp://purl.org/coar/resource_type/c_2f33uuid:83e0d99d-8644-403f-85d6-089c18b8e770Department of Computer ScienceAddison−Wesley2001Ryan, PSchneider, SGoldsmith, MLowe, GRoscoe, B |
spellingShingle | Ryan, P Schneider, S Goldsmith, M Lowe, G Roscoe, B Modelling and analysis of security protocols |
title | Modelling and analysis of security protocols |
title_full | Modelling and analysis of security protocols |
title_fullStr | Modelling and analysis of security protocols |
title_full_unstemmed | Modelling and analysis of security protocols |
title_short | Modelling and analysis of security protocols |
title_sort | modelling and analysis of security protocols |
work_keys_str_mv | AT ryanp modellingandanalysisofsecurityprotocols AT schneiders modellingandanalysisofsecurityprotocols AT goldsmithm modellingandanalysisofsecurityprotocols AT loweg modellingandanalysisofsecurityprotocols AT roscoeb modellingandanalysisofsecurityprotocols |