TY - GEN TI - The 8th IEEE computer security foundations workshop SN - 0818670339 U1 - 005.8 PY - 1995/// CY - Washington PB - IEEE KW - Computer security N1 - SecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152 ER -