Cryptographic Protocol Engineering-Building Security from the Ground Up.
Jim Alves-FossPublished in: International Conference on Internet Computing (2000)
Keyphrases
- cryptographic protocols
- security properties
- security protocols
- encryption decryption
- authentication protocol
- engineering design
- insider attacks
- standard model
- information security
- computer science
- software engineering
- real time
- security requirements
- definite clause
- security issues
- similarity measure
- database systems