| 000 | 00705 a2200157 4500 | ||
|---|---|---|---|
| 003 | Nust | ||
| 005 | 20170207152514.0 | ||
| 020 | _a0818670339 | ||
| 040 | _cNust | ||
| 082 | _a005.8 | ||
| 245 | _aThe 8th IEEE computer security foundations workshop | ||
| 260 |
_aWashington _bIEEE _c1995 |
||
| 505 | _aSecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152. | ||
| 538 | _aAlmirah No.22 Shelf No.2 | ||
| 650 | _aComputer security | ||
| 942 | _cREF | ||
| 999 |
_c175973 _d175973 |
||