Operational semantics and verification of security protocols:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2012
|
Schriftenreihe: | Information security and cryptography
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | XIII, 172 S. 235 mm x 155 mm |
ISBN: | 9783540786351 9783642430534 9783540786368 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV040608163 | ||
003 | DE-604 | ||
005 | 20200416 | ||
007 | t | ||
008 | 121204s2012 |||| 00||| eng d | ||
015 | |a 08,N26,0035 |2 dnb | ||
016 | 7 | |a 989060756 |2 DE-101 | |
020 | |a 9783540786351 |c Gb. : ca. EUR 53.45 (freier Pr.), ca. sfr 87.00 (freier Pr.) |9 978-3-540-78635-1 | ||
020 | |a 9783642430534 |9 978-3-642-43053-4 | ||
020 | |a 9783540786368 |c eBook |9 978-3-540-78636-8 | ||
024 | 3 | |a 9783540786351 | |
035 | |a (OCoLC)820518024 | ||
035 | |a (DE-599)DNB989060756 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-739 |a DE-634 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a ST 230 |0 (DE-625)143617: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Cremers, Cas |d 1974- |e Verfasser |0 (DE-588)1203670141 |4 aut | |
245 | 1 | 0 | |a Operational semantics and verification of security protocols |c Cas Cremers ; Sjouke Mauw |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2012 | |
300 | |a XIII, 172 S. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Information security and cryptography | |
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Software Engineering |0 (DE-588)4116521-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Architektur |0 (DE-588)4002851-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Authentifikation |0 (DE-588)4330656-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Formale Methode |0 (DE-588)4333722-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Verifikation |0 (DE-588)4135577-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Operationale Semantik |0 (DE-588)4221249-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenstruktur |0 (DE-588)4011146-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 0 | 1 | |a Operationale Semantik |0 (DE-588)4221249-2 |D s |
689 | 0 | 2 | |a Authentifikation |0 (DE-588)4330656-1 |D s |
689 | 0 | 3 | |a Mehrparteienprotokoll |0 (DE-588)4480818-5 |D s |
689 | 0 | 4 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 0 | 5 | |a Verifikation |0 (DE-588)4135577-5 |D s |
689 | 0 | 6 | |a Formale Methode |0 (DE-588)4333722-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 1 | 1 | |a Architektur |0 (DE-588)4002851-3 |D s |
689 | 1 | 2 | |a Software Engineering |0 (DE-588)4116521-4 |D s |
689 | 1 | 3 | |a Datenstruktur |0 (DE-588)4011146-5 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a Mauw, Sjouke |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |t Operational Semantics and Verification of Security Protocols |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-025435790 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804149700935286784 |
---|---|
adam_text | CONTENTS
1 INTRODUCTION 1
1.1 HISTORICAL CONTEXT 1
1.2 BLACK-BOX SECURITY PROTOCOL ANALYSIS 3
1.3 PURPOSE AND APPROACH 6
1.4 OVERVIEW 6
1.4.1 THE PROTOCOL ANALYSIS MODEL 6
1.4.2 APPLICATIONS OF THE MODEL 7
2 PRELIMINARIES 9
2.1 SETS AND RELATIONS 9
2.2 BNF GRAMMARS 10
2.3 LABELLED TRANSITION SYSTEMS 11
3 OPERATIONAL SEMANTICS 13
3.1 ANALYSIS OF THE PROBLEM DOMAIN 13
3.2 SECURITY PROTOCOL SPECIFICATION 17
3.2.1 ROLE TERMS 18
3.2.2 PROTOCOL SPECIFICATION 21
3.2.3 EVENT ORDER 23
3.3 DESCRIBING PROTOCOL EXECUTION 24
3.3.1 RUNS 25
3.3.2 MATCHING 27
3.3.3 RUN EVENTS 29
3.3.4 THREAT MODEL 30
3.4 OPERATIONAL SEMANTICS 31
3.5 EXAMPLE PROTOCOL SPECIFICATION 33
3.6 PROBLEMS 34
4 SECURITY PROPERTIES 37
4.1 SECURITY PROPERTIES AS CLAIM EVENTS 37
4.2 SECRECY 39
4.3 AUTHENTICATION 41
VII
HTTP://D-NB.INFO/989060756
VIII CONTENTS
4.3.1 ALIVENESS 41
4.3.2 SYNCHRONISATION 45
4.3.3 NON-INJECTIVE SYNCHRONISATION 46
4.3.4 INJECTIVE SYNCHRONISATION 48
4.3.5 MESSAGE AGREEMENT 50
4.4 AUTHENTICATION HIERARCHY 51
4.5 BREAKING AND FIXING THE NEEDHAM-SCHROEDER PROTOCOL 55
4.6 SUMMARY 62
4.7 PROBLEMS 63
5 VERIFICATION 67
5.1 PATTERNS 67
5.2 VERIFICATION ALGORITHM 74
5.2.1 WELL-TYPED PATTERNS 75
5.2.2 REALISABLE PATTERNS 75
5.2.3 EMPTY PATTERNS AND REDUNDANT PATTERNS 77
5.2.4 ALGORITHM OVERVIEW 78
5.2.5 PATTERN REFINEMENT 79
5.3 EXAMPLE OF SEARCH SPACE TRAVERSAL 82
5.4 VERIFYING SECURITY PROPERTIES USING PATTERN REFINEMENT 89
5.5 HEURISTICS AND PARAMETER CHOICES 90
5.5.1 HEURISTICS 90
5.5.2 CHOOSING A BOUND ON THE NUMBER OF RUNS 92
5.5.3 PERFORMANCE 94
5.6 VERIFYING INJECTIVITY 96
5.6.1 INJECTIVE SYNCHRONISATION 96
5.6.2 THE LOOP PROPERTY 99
5.6.3 MODEL ASSUMPTIONS 103
5.7 FURTHER FEATURES OF THE SCYTHER TOOL 103
5.8 PROBLEMS 105
6 MULTI-PROTOCOL ATTACKS 107
6.1 MULTI-PROTOCOL ATTACKS 108
6.2 EXPERIMENTS 109
6.3 RESULTS 110
6.3.1 STRICT TYPE MATCHING: NO TYPE FLAWS 112
6.3.2 SIMPLE TYPE MATCHING: BASIC TYPE FLAWS ONLY 113
6.3.3 UNTYPED MATCHING: ALL TYPE FLAWS 113
6.3.4 ATTACK EXAMPLE 113
6.4 ATTACK SCENARIOS 115
6.4.1 PROTOCOL UPDATES 116
6.4.2 AMBIGUOUS AUTHENTICATION 118
6.5 PREVENTING MULTI-PROTOCOL ATTACKS 120
6.6 SUMMARY 122
6.7 PROBLEMS 122
CONTENTS IX
7 GENERALISING NSL FOR MULTI-PARTY AUTHENTICATION 123
7.1 A MULTI-PARTY AUTHENTICATION PROTOCOL 124
7.2 ANALYSIS 127
7.2.1 INITIAL OBSERVATIONS 127
7.2.2 PROOF OF CORRECTNESS 127
7.2.3 SECRECY OF NONCES CREATED IN ROLE TQ 132
7.2.4 NON-INJECTIVE SYNCHRONISATION OF ROLE R0 133
7.2.5 SECRECY OF NONCES CREATED IN ROLE RF FOR X 0 134
7.2.6 NON-INJECTIVE SYNCHRONISATION OF ROLE RF FOR .* 0 .... 134
7.2.7 INJECTIVE SYNCHRONISATION OF ALL ROLES 135
7.2.8 TYPE-FLAW ATTACKS 135
7.2.9 MESSAGE MINIMALITY 136
7.3 VARIATIONS ON THE PATTERN 136
7.4 WEAKER MULTI-PARTY AUTHENTICATION PROTOCOLS 139
7.5 PROBLEMS 140
8 HISTORICAL BACKGROUND AND FURTHER READING 143
8.1 HISTORICAL BACKGROUND 143
8.1.1 MODELS 143
8.1.2 INITIAL TOOLS 143
8.1.3 LOGICS 144
8.1.4 TOOL PROLIFERATION 145
8.1.5 MULTI-PROTOCOL ATTACKS 146
8.1.6 COMPLEXITY RESULTS 147
8.1.7 DIVERGENCE BETWEEN SYMBOLIC AND COMPUTATIONAL MODELS 147
8.1.8 BRIDGING THE GAP BETWEEN SYMBOLIC ANALYSIS AND CODE . . 148
8.2 ALTERNATIVE APPROACHES 149
8.2.1 MODELLING FRAMEWORKS 149
8.2.2 SECURITY PROPERTIES 150
8.2.3 TOOLS 153
REFERENCES 157
INDEX 167
Security protocols are widely used to ensure secure communications over insecure networks,
such as the internet or airwaves. These protocols use strong cryptography to prevent intruders
from reading or modifying the messages. However, using cryptography is not enough to ensure
their correctness. Combined with their typical small size, which suggests that one could easily
assess their correctness, this often results in incorrectly designed protocols.
The authors present a methodology for formally describing security protocols and their
environment. This methodology includes a model for describing protocols, their execution
model, and the intruder model. The models are extended with a number of well-defined
security properties, which capture the notions of correct protocols, and secrecy of data.
The methodology can be used to prove that protocols satisfy these properties. Based on the
model they have developed a tool set called Scyther that can automatically find attacks on
security protocols or prove their correctness. !n case studies they show the application of the
methodology as well as the effectiveness of the analysis tool.
The methodology s strong mathematical basis, the strong separation of concerns in the model,
and the accompanying tool set make it ideally suited both for researchers and graduate students
of information security or formal methods and for advanced professionals designing critical
security protocols.
|
any_adam_object | 1 |
author | Cremers, Cas 1974- Mauw, Sjouke |
author_GND | (DE-588)1203670141 |
author_facet | Cremers, Cas 1974- Mauw, Sjouke |
author_role | aut aut |
author_sort | Cremers, Cas 1974- |
author_variant | c c cc s m sm |
building | Verbundindex |
bvnumber | BV040608163 |
classification_rvk | ST 230 ST 277 |
ctrlnum | (OCoLC)820518024 (DE-599)DNB989060756 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03441nam a2200721 c 4500</leader><controlfield tag="001">BV040608163</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200416 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">121204s2012 |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N26,0035</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">989060756</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540786351</subfield><subfield code="c">Gb. : ca. EUR 53.45 (freier Pr.), ca. sfr 87.00 (freier Pr.)</subfield><subfield code="9">978-3-540-78635-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642430534</subfield><subfield code="9">978-3-642-43053-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540786368</subfield><subfield code="c">eBook</subfield><subfield code="9">978-3-540-78636-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540786351</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)820518024</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB989060756</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 230</subfield><subfield code="0">(DE-625)143617:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cremers, Cas</subfield><subfield code="d">1974-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1203670141</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Operational semantics and verification of security protocols</subfield><subfield code="c">Cas Cremers ; Sjouke Mauw</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 172 S.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Information security and cryptography</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Architektur</subfield><subfield code="0">(DE-588)4002851-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Operationale Semantik</subfield><subfield code="0">(DE-588)4221249-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Operationale Semantik</subfield><subfield code="0">(DE-588)4221249-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Authentifikation</subfield><subfield code="0">(DE-588)4330656-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Mehrparteienprotokoll</subfield><subfield code="0">(DE-588)4480818-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="4"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="5"><subfield code="a">Verifikation</subfield><subfield code="0">(DE-588)4135577-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="6"><subfield code="a">Formale Methode</subfield><subfield code="0">(DE-588)4333722-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Architektur</subfield><subfield code="0">(DE-588)4002851-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Software Engineering</subfield><subfield code="0">(DE-588)4116521-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Datenstruktur</subfield><subfield code="0">(DE-588)4011146-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mauw, Sjouke</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="t">Operational Semantics and Verification of Security Protocols</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-025435790</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV040608163 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:27:12Z |
institution | BVB |
isbn | 9783540786351 9783642430534 9783540786368 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-025435790 |
oclc_num | 820518024 |
open_access_boolean | |
owner | DE-11 DE-739 DE-634 |
owner_facet | DE-11 DE-739 DE-634 |
physical | XIII, 172 S. 235 mm x 155 mm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Springer |
record_format | marc |
series2 | Information security and cryptography |
spelling | Cremers, Cas 1974- Verfasser (DE-588)1203670141 aut Operational semantics and verification of security protocols Cas Cremers ; Sjouke Mauw Berlin [u.a.] Springer 2012 XIII, 172 S. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Information security and cryptography Hier auch später erschienene, unveränderte Nachdrucke Software Engineering (DE-588)4116521-4 gnd rswk-swf Architektur (DE-588)4002851-3 gnd rswk-swf Authentifikation (DE-588)4330656-1 gnd rswk-swf Formale Methode (DE-588)4333722-3 gnd rswk-swf Verifikation (DE-588)4135577-5 gnd rswk-swf Mehrparteienprotokoll (DE-588)4480818-5 gnd rswk-swf Rechnernetz (DE-588)4070085-9 gnd rswk-swf Operationale Semantik (DE-588)4221249-2 gnd rswk-swf Datenstruktur (DE-588)4011146-5 gnd rswk-swf Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 s Operationale Semantik (DE-588)4221249-2 s Authentifikation (DE-588)4330656-1 s Mehrparteienprotokoll (DE-588)4480818-5 s Kryptoanalyse (DE-588)4830502-9 s Verifikation (DE-588)4135577-5 s Formale Methode (DE-588)4333722-3 s DE-604 Rechnernetz (DE-588)4070085-9 s Architektur (DE-588)4002851-3 s Software Engineering (DE-588)4116521-4 s Datenstruktur (DE-588)4011146-5 s 1\p DE-604 Mauw, Sjouke Verfasser aut Erscheint auch als Online-Ausgabe Operational Semantics and Verification of Security Protocols DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Cremers, Cas 1974- Mauw, Sjouke Operational semantics and verification of security protocols Software Engineering (DE-588)4116521-4 gnd Architektur (DE-588)4002851-3 gnd Authentifikation (DE-588)4330656-1 gnd Formale Methode (DE-588)4333722-3 gnd Verifikation (DE-588)4135577-5 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Rechnernetz (DE-588)4070085-9 gnd Operationale Semantik (DE-588)4221249-2 gnd Datenstruktur (DE-588)4011146-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4116521-4 (DE-588)4002851-3 (DE-588)4330656-1 (DE-588)4333722-3 (DE-588)4135577-5 (DE-588)4480818-5 (DE-588)4070085-9 (DE-588)4221249-2 (DE-588)4011146-5 (DE-588)4830502-9 (DE-588)4709127-7 |
title | Operational semantics and verification of security protocols |
title_auth | Operational semantics and verification of security protocols |
title_exact_search | Operational semantics and verification of security protocols |
title_full | Operational semantics and verification of security protocols Cas Cremers ; Sjouke Mauw |
title_fullStr | Operational semantics and verification of security protocols Cas Cremers ; Sjouke Mauw |
title_full_unstemmed | Operational semantics and verification of security protocols Cas Cremers ; Sjouke Mauw |
title_short | Operational semantics and verification of security protocols |
title_sort | operational semantics and verification of security protocols |
topic | Software Engineering (DE-588)4116521-4 gnd Architektur (DE-588)4002851-3 gnd Authentifikation (DE-588)4330656-1 gnd Formale Methode (DE-588)4333722-3 gnd Verifikation (DE-588)4135577-5 gnd Mehrparteienprotokoll (DE-588)4480818-5 gnd Rechnernetz (DE-588)4070085-9 gnd Operationale Semantik (DE-588)4221249-2 gnd Datenstruktur (DE-588)4011146-5 gnd Kryptoanalyse (DE-588)4830502-9 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Software Engineering Architektur Authentifikation Formale Methode Verifikation Mehrparteienprotokoll Rechnernetz Operationale Semantik Datenstruktur Kryptoanalyse Sicherheitsprotokoll |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=025435790&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT cremerscas operationalsemanticsandverificationofsecurityprotocols AT mauwsjouke operationalsemanticsandverificationofsecurityprotocols |