Menu
Home
Advanced Search
Directory of Libraries
عنوان
Formal models and techniques for analyzing security protocols
پدید آورنده
edited by Veronique Cortier and Steve Kremer
موضوع
، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
رده
QA
76
.
9
.
A25
F6563
کتابخانه
Central Library of Hamedan University of Technology
محل استقرار
استان:
Hamedan
ـ شهر:
Hamedan
تماس با کتابخانه :
38411100
-
081
TITLE AND STATEMENT OF RESPONSIBILITY
Title Proper
Formal models and techniques for analyzing security protocols
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Amsterdam ; Washington, DC
Name of Publisher, Distributor, etc.
IOS Press
Date of Publication, Distribution, etc.
c2011
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
vii, 303 p. : ill. ; 25 cm.
SERIES
Other Title Information
Cryptology and information security series ;v. 5
GENERAL NOTES
Text of Note
Includes bibliographical references and index
NOTES PERTAINING TO TITLE AND STATEMENT OF RESPONSIBILITY
Text of Note
edited by Veronique Cortier and Steve Kremer
ORIGINAL VERSION NOTE
Text of Note
1
TOPICAL NAME USED AS SUBJECT
Entry Element
، Computer security
Entry Element
Access control ، Computers
Entry Element
Security measures ، Computer networks
Entry Element
Access control ، Electronic information resources
DEWEY DECIMAL CLASSIFICATION
Number
005
.
8
LIBRARY OF CONGRESS CLASSIFICATION
Class number
QA
76
.
9
.
A25
F6563
PERSONAL NAME - PRIMARY RESPONSIBILITY
Relator Code
TI
AU Cortier, Veronique
AU Kremer, Steve
SE
SE Cryptology and information security series ;
Proposal/Bug Report
×
Proposal/Bug Report
×
Warning!
Enter The Information Carefully
Error Report
Proposal