000 00705 a2200157 4500
003 Nust
005 20170207152514.0
020 _a0818670339
040 _cNust
082 _a005.8
245 _aThe 8th IEEE computer security foundations workshop
260 _aWashington
_bIEEE
_c1995
505 _aSecuComposition Simon Foley Page No 2, Authentication Protocols Page No 24, Analysis of Cryptographic Protocols Page No38,Panel on What Makes a Cryptographic Protocol Dependable? Page No 58, Models of Cryptographic Protocols Page No 98,re Systems Page No118, Panel on Considering the Common Criteria Page No 148, Information Flow Page No 152.
538 _aAlmirah No.22 Shelf No.2
650 _aComputer security
942 _cREF
999 _c175973
_d175973