Modelling and analysis of security protocols

Bibliographic Details
Main Authors: Ryan, P, Schneider, S, Goldsmith, M, Lowe, G, Roscoe, B
Format: Book
Published: Addison−Wesley 2001
_version_ 1797079283100811264
author Ryan, P
Schneider, S
Goldsmith, M
Lowe, G
Roscoe, B
author_facet Ryan, P
Schneider, S
Goldsmith, M
Lowe, G
Roscoe, B
author_sort Ryan, P
collection OXFORD
description
first_indexed 2024-03-07T00:43:36Z
format Book
id oxford-uuid:83e0d99d-8644-403f-85d6-089c18b8e770
institution University of Oxford
last_indexed 2024-03-07T00:43:36Z
publishDate 2001
publisher Addison−Wesley
record_format dspace
spelling oxford-uuid:83e0d99d-8644-403f-85d6-089c18b8e7702022-03-26T21:47:16ZModelling and analysis of security protocolsBookhttp://purl.org/coar/resource_type/c_2f33uuid:83e0d99d-8644-403f-85d6-089c18b8e770Department of Computer ScienceAddison−Wesley2001Ryan, PSchneider, SGoldsmith, MLowe, GRoscoe, B
spellingShingle Ryan, P
Schneider, S
Goldsmith, M
Lowe, G
Roscoe, B
Modelling and analysis of security protocols
title Modelling and analysis of security protocols
title_full Modelling and analysis of security protocols
title_fullStr Modelling and analysis of security protocols
title_full_unstemmed Modelling and analysis of security protocols
title_short Modelling and analysis of security protocols
title_sort modelling and analysis of security protocols
work_keys_str_mv AT ryanp modellingandanalysisofsecurityprotocols
AT schneiders modellingandanalysisofsecurityprotocols
AT goldsmithm modellingandanalysisofsecurityprotocols
AT loweg modellingandanalysisofsecurityprotocols
AT roscoeb modellingandanalysisofsecurityprotocols