1
Published 2001
Springer Berlin Heidelberg
Table of Contents: ...Mathematical Models of Computer Security -- The Logic of Authentication Protocols -- Access Control...