Related Books

Operational Semantics and Verification of Security Protocols
Language: en
Pages: 176
Authors: Cas Cremers
Categories: Computers
Type: BOOK - Published: 2012-10-30 - Publisher: Springer Science & Business Media

DOWNLOAD EBOOK

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptogr
Foundations of Security, Protocols, and Equational Reasoning
Language: en
Pages: 250
Authors: Joshua D. Guttman
Categories: Computers
Type: BOOK - Published: 2019-05-17 - Publisher: Springer

DOWNLOAD EBOOK

This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Frede
13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)
Language: en
Pages: 477
Authors: Álvaro Herrero
Categories: Technology & Engineering
Type: BOOK - Published: 2020-08-27 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 20
Secure Multi-Party E-Commerce Protocols
Language: en
Pages: 109
Authors: Cătălin V. Bîrjoveanu
Categories: Computers
Type: BOOK - Published: 2022-06-30 - Publisher: Springer Nature

DOWNLOAD EBOOK

This book presents the state of the art for multi-party fair exchange protocols and provides insight details regarding multi-party applications for buying physi
Computer Security Handbook, Set
Language: en
Pages: 2353
Authors: Seymour Bosworth
Categories: Business & Economics
Type: BOOK - Published: 2014-03-24 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Computer security touches every part of our daily lives from our computers and connected devices to the wireless signals around us. Breaches have real and immed