The 8th IEEE computer security foundations workshop
- Washington IEEE 1995
SecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152.