Bibliography

[1] M. Abadi and A. D. Gordon. A calculus for cryptographic protocols: the spi calculus. Information and Computation, 148, 1999.

[2] M. Abadi and R. Needham. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering, 22(1), 1996.

[3] M. Abadi and M. Tuttle . A semantics for a logic of authentication. Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing, 1991.

[4] R. Anderson, B. Crispo, J. H. Lee, C. Manifavas, V. Matyas Jr., and F. A. P. Petitcolas . The Global Internet Trust Register. MIT Press, 1999.

[5]R. Anderson and R. Needham. Programming Satan’s computer. In J. van Leeuwen (ed.) Computer Science Today, volume 1000 of LNCS. Springer, 1995.

[6] N. Asokan, ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.