Secure transaction protocol analysis : models and applications (English)
- New search for: Chen, Qingfeng
- New search for: Zhang, Chengqi
- New search for: Zhang, Shichao
- New search for: Chen, Qingfeng
- New search for: Zhang, Chengqi
- New search for: Zhang, Shichao
2008
-
ISBN:
- Report / Print
-
Title:Secure transaction protocol analysis : models and applications
-
Contributors:
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , Heidelberg [u.a.]
-
Publication date:2008
-
Size:XI, 234 S.
-
Remarks:235 mm x 155 mm
graph. Darst.
Digital preservation by Badische Landesbibliothek -
ISBN:
-
Type of media:Report
-
Type of material:Print
-
Language:English
-
Contract number:12327997
- New search for: 005.8
- Further information on Dewey Decimal Classification
- New search for: 54.32
- Further information on Basic classification
-
Keywords:
-
Classification:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
IntroductionChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 2
-
Overview of Security Protocol AnalysisChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 3
-
Formal Analysis of Secure Transaction ProtocolsChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 4
-
Model Checking in Security Protocol AnalysisChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 5
-
Uncertainty Issues in Secure MessagesChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 6
-
Applications of Data Mining in Protocol AnalysisChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 7
-
Detection Models of Collusion AttacksChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008
- 8
-
Conclusion and Future WorksChen, Qingfeng / Zhang, Chengqi / Zhang, Shichao et al. | 2008