The 8th IEEE computer security foundations workshop
Publisher: Washington IEEE 1995ISBN: 0818670339Subject(s): Computer securityDDC classification: 005.8
Contents:
SecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152.
| Item type | Current location | Home library | Shelving location | Call number | URL | Status | Notes | Date due | Barcode | Item holds |
|---|---|---|---|---|---|---|---|---|---|---|
Book
|
Military College of Signals (MCS) | Military College of Signals (MCS) | General Stacks | 005.8,EIG (Browse shelf) | Link to resource | Available | Almirah No.8, Shelf No.6 | MCS27439 |
Total holds: 0
Browsing Military College of Signals (MCS) shelves, Shelving location: General Stacks Close shelf browser
SecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152.
Almirah No.22 Shelf No.2

Book
There are no comments on this title.