The 8th IEEE computer security foundations workshop - Washington IEEE 1995

SecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152.


Almirah No.22 Shelf No.2

0818670339


Computer security

005.8