Bibliography
[biblio01entry01] 1. , “Explicit Communication Revisited: Two New Attacks on Authentication Protocols,” IEEE Transactions on Software Engineering (3), pp. 185–186 (Mar. 1997).
[biblio01entry02] 2. and , “Prudent Engineering Practice for Cryptographic Protocols,” Proceedings of the 1994 IEEE Symposium on Research in Security and Privacy, pp. 122–136 (May 1994).
[biblio01entry03] 3. and , “Security Analysis and Enhancements of Computer Operating Systems,” Technical Report NBSIR 76–1041, ICET, National Bureau of Standards, Washington, DC 20234 (Apr. 1976).
[biblio01entry04] 4. and , “Abstraction and Refinement of Layered Security ...
Get Introduction to Computer Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.