It looks like you're offline.
Open Library logo
additional options menu

MARC record from Internet Archive

LEADER: 01908cam 2200409Ia 4500
001 9920773340001661
005 20150423131610.0
008 080709s2008 gw a b 001 0 eng d
020 $a9783540850731
020 $a3540850732
029 1 $aOHX$bhar080111339
035 $a(CSdNU)u334941-01national_inst
035 $a(OCoLC)233932804
035 $a(OCoLC)233932804
035 $a(OCoLC)233932804
040 $aBTCTA$cBTCTA$dBAKER$dOHX$dYDXCP$dTXH$dOrLoB-B
049 $aCNUM
090 $aTK5105.59$b.C44 2008
100 1 $aChen, Qingfeng.
245 10 $aSecure transaction protocol analysis :$bmodels and applications / $cQinggeng Chen, Chengqi Zhang, Shichao Zhang.
260 $aBerlin ;$aNew York :$bSpringer-Verlag,$cc2008.
300 $axi, 234 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references (p. [223]-231) and index.
505 0 $a1. Introduction -- 2. Overview of Security Protocol Analysis -- 3. Formal Analysis of Secure Transaction Protocols -- 4. Model Checking in Security Protocol Analysis -- 5. Uncertainty Issues in Secure Messages -- 6. Applications of Data Mining in Protocol Analysis -- 7. Detection Models of Collusion Attacks -- 8. Conclusion and Future Works.
650 0 $aComputer networks$xSecurity measures.
650 0 $aElectronic commerce$xSecurity measures.
650 0 $aComputer network protocols.
700 1 $aZhang, Chengqi,$d1957-
700 1 $aZhang, Shichao.
938 $aBaker and Taylor$bBTCP$nBK0007863075
938 $aBaker & Taylor$bBKTY$c69.95$d69.95$i3540850732$n0007863075$sactive
938 $aOtto Harrassowitz$bHARR$nhar080111339$c68.84 CAD
938 $aYBP Library Services$bYANK$n2881267
947 $fSOET-CIS$hCIRCSTACKS$p$66.45$q1
949 $aTK 5105.59 .C44 2008$i31786102445555
994 $a92$bCNU
999 $aTK 5105.59 .C44 2008$wLC$c1$i31786102445555$lCIRCSTACKS$mNULS$rY$sY $tBOOK$u10/29/2008