<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>The 8th IEEE computer security foundations workshop</title>
  </titleInfo>
  <typeOfResource/>
  <originInfo>
    <place>
      <placeTerm type="text">Washington</placeTerm>
    </place>
    <publisher>IEEE</publisher>
    <dateIssued>1995</dateIssued>
    <issuance/>
  </originInfo>
  <tableOfContents>SecuComposition Simon Foley  Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152.</tableOfContents>
  <note>Almirah No.22 Shelf No.2</note>
  <subject>
    <topic>Computer security</topic>
  </subject>
  <classification authority="ddc">005.8</classification>
  <identifier type="isbn">0818670339</identifier>
  <recordInfo>
    <recordContentSource authority="marcorg"/>
    <recordChangeDate encoding="iso8601">20170207152514.0</recordChangeDate>
  </recordInfo>
</mods>
