Breaking News!
60% Off the Hottest Halloween Costumes & Accessories

Operational Semantics and Verification of Security Protocols

Best Price (Coupon Required):
Buy Operational Semantics and Verification of Security Protocols for $49.50 at @ Link.springer.com when you apply the 10% OFF coupon at checkout.
Click “Get Coupon & Buy” to copy the code and unlock the deal.

Set a price drop alert to never miss an offer.

1 Offer Price Range: $54.99 - $54.99
BEST PRICE

Single Product Purchase

$49.50
@ Link.springer.com with extra coupon

Price Comparison

Seller Contact Seller List Price On Sale Shipping Best Promo Final Price Volume Discount Financing Availability Seller's Page
BEST PRICE
1 Product Purchase
@ Link.springer.com
$54.99 $54.99

10% OFF
This deals requires coupon
$49.50
See Site In stock Visit Store

Product Details

Brand
Springer Nature
Manufacturer
N/A
Part Number
0
GTIN
9783540786351
Condition
New
Product Description

Security protocols are widely used to ensure secure communications over insecure networks, such as the internet or airwaves. These protocols use strong cryptography to prevent intruders from reading or modifying the messages. However, using cryptography is not enough to ensure their correctness. Combined with their typical small size, which suggests that one could easily assess their correctness, this often results in incorrectly designed protocols. The authors present a methodology for formally describing security protocols and their environment. This methodology includes a model for describing protocols, their execution model, and the intruder model. The models are extended with a number of well-defined security properties, which capture the notions of correct protocols, and secrecy of data. The methodology can be used to prove that protocols satisfy these properties. Based on the model they have developed a tool set called Scyther that can automatically find attacks on security protocols or prove their correctness. In case studies they show the application of the methodology as well as the effectiveness of the analysis tool. The methodologys strong mathematical basis, the strong separation of concerns in the model, and the accompanying tool set make it ideally suited both for researchers and graduate students of information security or formal methods and for advanced professionals designing critical security protocols.

Available Colors
Available Sizes

Reviews

0
0 reviews
5 stars
4 stars
3 stars
2 stars
1 star

Questions & Answers

Similar Products

Plant Biogeography and Vegetation of High Mountains of Central and South-West Asia

Plant Biogeography and Vegetation of High Mountains of Central and South-West Asia

$129.00
The Development of the Cultural Industry in China

The Development of the Cultural Industry in China

$139.99
Challenges of Healthcare Systems in the Era of COVID-19

Challenges of Healthcare Systems in the Era of COVID-19

$159.99
Datentransportkostenoptimale Gestaltung von Rechnernetzen

Datentransportkostenoptimale Gestaltung von Rechnernetzen

$69.99
The Utilization of Bioremediation to Reduce Soil Contamination: Problems and Solutions

The Utilization of Bioremediation to Reduce Soil Contamination: Problems and Solutions

$219.99
Multiprocessor Execution of Logic Programs

Multiprocessor Execution of Logic Programs

$169.99
Presidential Risk Behavior in Foreign Policy

Presidential Risk Behavior in Foreign Policy

$39.99
Gesundheitsvorsorge bei Kindern

Gesundheitsvorsorge bei Kindern

$39.99
Experimentelle Entwicklungsforschung

Experimentelle Entwicklungsforschung

$59.99
Discrete-Time Stochastic Sliding Mode Control Using Functional Observation

Discrete-Time Stochastic Sliding Mode Control Using Functional Observation

$129.99
Windenergie in Sdamerika

Windenergie in Sdamerika

$79.99
Understanding Society and Natural Resources

Understanding Society and Natural Resources

$59.99
Crime and Punishment in England, 1100-1990

Crime and Punishment in England, 1100-1990

$53.00
VLSI-SoC: Research Trends in VLSI and Systems on Chip

VLSI-SoC: Research Trends in VLSI and Systems on Chip

$109.99
Mathematische Grundlagen der Digitalisierung

Mathematische Grundlagen der Digitalisierung

$17.99
Multi-Owned Property in the Asia-Pacific Region

Multi-Owned Property in the Asia-Pacific Region

$54.99
IBD at the End of its First Century

IBD at the End of its First Century

$169.99
Problems in the General Theory of Relativity and Theory of Group Representations

Problems in the General Theory of Relativity and Theory of Group Representations

$54.99
Crisis Management in China

Crisis Management in China

$89.00
Conceptual Structures: Inspiration and Application

Conceptual Structures: Inspiration and Application

$54.99
Kent State (Hardcover)

Kent State (Hardcover)

$14.99
Can It Float?

Can It Float?

$3.71
Brand Premium

Brand Premium

$27.99
Die Influenza-Epidemie in Egypten im Winter 1889/90

Die Influenza-Epidemie in Egypten im Winter 1889/90

$54.99
Industrielle Bildverarbeitung

Industrielle Bildverarbeitung

$79.99
Proceedings of the 5th International Conference on Transportation Geotechnics (ICTG) 2024, Volume 4

Proceedings of the 5th International Conference on Transportation Geotechnics (ICTG) 2024, Volume 4

$279.99
Spielen als pdagogische Manahme

Spielen als pdagogische Manahme

$39.99
Computer Algebra

Computer Algebra

$59.99
Theory and Practice of Model Transformations

Theory and Practice of Model Transformations

$39.99
The Era of Longevity

The Era of Longevity

$59.99
Therapy of Skin Diseases

Therapy of Skin Diseases

$119.00
Superconducting Quantum Electronics

Superconducting Quantum Electronics

$119.00
Expressive Movement

Expressive Movement

$54.99
Psychosocial Experiences of African Migrants in Six European Countries

Psychosocial Experiences of African Migrants in Six European Countries

$59.99
Cognitive Psychotherapy Toward a New Millennium

Cognitive Psychotherapy Toward a New Millennium

$109.99
N-Acetylaspartate

N-Acetylaspartate

$169.00
Reforming the World's Money

Reforming the World's Money

$74.99
Analyzing and Theorizing the Dynamics of the Workplace Incivility Crisis

Analyzing and Theorizing the Dynamics of the Workplace Incivility Crisis

$54.99
Introduction to Vascular Neurosurgery

Introduction to Vascular Neurosurgery

$169.99
Produktorientiertes Qualittsmanagement des Einzelhandels

Produktorientiertes Qualittsmanagement des Einzelhandels

$59.99
previous
next