What people are saying - Write a review
We haven't found any reviews in the usual places.
A HighThroughput Secure Reliable Multicast Protocol
Intensional Specification of Security Protocols
13 other sections not shown
Other editions - View all
A. W. Roscoe ActH action system agent algorithm attack authentication BAN Logic Believes BGNY bisimulation components composition Computer Security constraints cryptographic protocols defined definition denote Deontic Logic detection document encrypted example execute fenv freshness function gni secure GNY logic GNY rule hash IEEE Computer IEEE Symposium input intensional specification interleaving intruder jammer L-Sec language rule Lemma LOUT(x low level event matching rule message authentication code msel multicast multiple selection narrowing steps Needham-Schroeder nodes nonce Noninterference nonself strings objects operations or-role output possible principal proof protection domain Protocol Analyzer protocol run protocol stage prove read(j relational databases role role-based access control rule of Type RUNh satisfy SBSNNI Security and Privacy security policy security properties semantics sequence server session statement storage jamming subliminal channel subrole subterm Symposium on Security term Theorem tion tocol tuples variables word