00684 a2200145 4500003000500000005001700005020001500022040000900037082001000046245005600056260002700112505034800139538002900487650002200516Nust20170207152514.0 a0818670339 cNust a005.8 aThe 8th IEEE computer security foundations workshop aWashingtonbIEEEc1995 aSecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152. aAlmirah No.22 Shelf No.2 aComputer security