Analysing Security Protocols using CSP
Main Author: | |
---|---|
Other Authors: | |
Format: | Book |
Published: |
2011
|
_version_ | 1797083244684902400 |
---|---|
author | Lowe, G |
author2 | Cortier, V |
author_facet | Cortier, V Lowe, G |
author_sort | Lowe, G |
collection | OXFORD |
description | |
first_indexed | 2024-03-07T01:38:59Z |
format | Book |
id | oxford-uuid:962d2ebf-86f1-475b-85ee-f526549d9d4b |
institution | University of Oxford |
last_indexed | 2024-03-07T01:38:59Z |
publishDate | 2011 |
record_format | dspace |
spelling | oxford-uuid:962d2ebf-86f1-475b-85ee-f526549d9d4b2022-03-26T23:51:14ZAnalysing Security Protocols using CSPBookhttp://purl.org/coar/resource_type/c_2f33uuid:962d2ebf-86f1-475b-85ee-f526549d9d4bDepartment of Computer Science2011Lowe, GCortier, VKremer, S |
spellingShingle | Lowe, G Analysing Security Protocols using CSP |
title | Analysing Security Protocols using CSP |
title_full | Analysing Security Protocols using CSP |
title_fullStr | Analysing Security Protocols using CSP |
title_full_unstemmed | Analysing Security Protocols using CSP |
title_short | Analysing Security Protocols using CSP |
title_sort | analysing security protocols using csp |
work_keys_str_mv | AT loweg analysingsecurityprotocolsusingcsp |