Operational Semantics and Verification of Security Protocols By Cas Cremers, Sjouke MauwEnglish | PDF | 2012 | 176 Pages | ISBN : 354078635X | 3.46 MB
Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves.