Reconciling Information Exchange and Confidentiality — A Formal Approach

Предна корица
 

Какво казват хората - Напишете рецензия

Не намерихме рецензии на обичайните места.

Съдържание

Introduction
3
Preliminaries
17
Cryptographic Hash Functions
29
Authentication Logics
47
Unsoundness of BAN logic
55
Extending GNY Logic
67
Information Designators
81
Knowledge Authentication
101
shown as a colored surface with l 4
152
Conclusion
171
A Remarks to Authentication Logics
179
Remarks to Knowledge Authentication
187
E Notation
207
Author Index
226
About the Author
234
Авторско право

Manytomany Protocols T2
145

Често срещани думи и фрази

Библиография