![Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information Cryptographic protocols / Computing / Burrows–Abadi–Needham logic / Cryptographic nonce / Challenge-response authentication / Communications protocol / Transmission Control Protocol / Otway–Rees protocol / Cryptography / Data / Information](https://www.pdfsearch.io/img/5b6efc897283a65ac18a8abba10cce15.jpg) Date: 2010-05-31 18:52:04Cryptographic protocols Computing Burrows–Abadi–Needham logic Cryptographic nonce Challenge-response authentication Communications protocol Transmission Control Protocol Otway–Rees protocol Cryptography Data Information | | Modelling Cryptographic Protocols in a Theory of Action James P. Delgrande and Torsten Grote and Aaron Hunter School of Computing Science, Simon Fraser University, Burnaby, B.C., Canada V5A 1S6.Add to Reading ListSource URL: www.cs.sfu.caDownload Document from Source Website File Size: 130,47 KBShare Document on Facebook
|