0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Formal Correctness of Security Protocols (Hardcover, 2007 ed.): Giampaolo Bella Formal Correctness of Security Protocols (Hardcover, 2007 ed.)
Giampaolo Bella
R2,354 R1,673 Discovery Miles 16 730 Save R681 (29%) Ships in 12 - 17 working days

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.

Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022,... Innovative Security Solutions for Information Technology and Communications - 15th International Conference, SecITC 2022, Virtual Event, December 8–9, 2022, Revised Selected Papers (1st ed. 2023)
Giampaolo Bella, Mihai Doinea, Helge Janicke
R2,313 Discovery Miles 23 130 Ships in 10 - 15 working days

This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8–9, 2022. The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.

Formal Correctness of Security Protocols (Paperback, Softcover reprint of hardcover 1st ed. 2007): Giampaolo Bella Formal Correctness of Security Protocols (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Giampaolo Bella
R1,540 Discovery Miles 15 400 Ships in 10 - 15 working days

The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Dynasties - The Greatest Of Their Kind
David Attenborough DVD R32 Discovery Miles 320
Dala A2 Sketch Pad (120gsm)(36 Sheets)
R260 Discovery Miles 2 600
Fly Repellent ShooAway (Black)(3 Pack)
R1,047 R837 Discovery Miles 8 370
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, … Blu-ray disc  (1)
R131 R71 Discovery Miles 710
Avengers: 4-Movie Collection - The…
Robert Downey Jr., Chris Evans, … Blu-ray disc R589 Discovery Miles 5 890
6mm Yoga Mat & Carry Bag [Blue]
R191 Discovery Miles 1 910
This Is Why
Paramore CD R392 Discovery Miles 3 920
Garmin Forerunner 55 Smartwatch (Aqua)
 (3)
R4,699 R4,299 Discovery Miles 42 990
Deadpool 2 - Super Duper Cut
Ryan Reynolds Blu-ray disc R52 Discovery Miles 520
Ravensburger Marvel Jigsaw Puzzles…
R299 R250 Discovery Miles 2 500

 

Partners