Bibliography

[biblio01entry01] 1. M. Abadi, “Explicit Communication Revisited: Two New Attacks on Authentication Protocols,” IEEE Transactions on Software Engineering 23 (3), pp. 185–186 (Mar. 1997).

[biblio01entry02] 2. M. Abadi and R. Needham, “Prudent Engineering Practice for Cryptographic Protocols,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 122–136 (May 1994).

[biblio01entry03] 3. R. Abbott, J. Chin, J. Donnelley, W. Konigsford, S. Tokubo, and D. Webb, “Security Analysis and Enhancements of Computer Operating Systems,” Technical Report NBSIR 76–1041, ICET, National Bureau of Standards, Washington, DC 20234 (Apr. 1976).

[biblio01entry04] 4. M. Abrams and D. Bailey, “Abstraction and Refinement of Layered Security ...

Get Computer Security: Art and Science now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.