×


 x 

Shopping cart
Cremers, Cas; Mauw, Sjouke - Operational Semantics and Verification of Security Protocols - 9783540786351 - V9783540786351
Stock image for illustration purposes only - book cover, edition or condition may vary.

Operational Semantics and Verification of Security Protocols

€ 83.52
FREE Delivery in Ireland
Description for Operational Semantics and Verification of Security Protocols Hardcover.

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols.

The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of ... Read more

The methodology’s strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

 

Show Less

Product Details

Format
Hardback
Publication date
2012
Publisher
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Germany
Condition
New
Number of Pages
174
Place of Publication
Berlin, Germany
ISBN
9783540786351
SKU
V9783540786351
Shipping Time
Usually ships in 15 to 20 working days
Ref
99-15

About Cremers, Cas; Mauw, Sjouke
The first author is a senior scientist working at the ETH Zürich, the second author is a professor at the Université du Luxembourg; both have a research focus and teaching responsibilities in the areas of information security, protocols, privacy, trust and formal methods.  

Reviews for Operational Semantics and Verification of Security Protocols
"This book is a great resource for anyone who wants to do research in the security analysis of protocols. It is written in a textbook style by authors who have excellent command over the subject. It could be used for self-study too ... overall the book does superb justice to the subject in every aspect." [Sashank Dara, Cisco Systems Inc., ... Read more

Goodreads reviews for Operational Semantics and Verification of Security Protocols


Subscribe to our newsletter

News on special offers, signed editions & more!