Security Protocols
暂无分享,去创建一个
J. van Leeuwen | Bruce Christianson | Jan van Leeuwen | Michael Roe | Bruno Crispo | James A. Malcolm
[1] I. G. BONNER CLAPPISON. Editor , 1960, The Electric Power Engineering Handbook - Five Volume Set.
[2] Martn Abadi,et al. Security Protocols and their Properties , 2000 .
[3] Jan Jürjens. Secure Java Development with UML , 2001, Network Security.
[4] Jan Jürjens,et al. Towards Development of Secure Systems Using UMLsec , 2001, FASE.
[5] Jan Jürjens,et al. Security Modelling for Electronic Commerce: The Common Electronic Purse Specifications , 2001, I3E.
[6] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[7] Lawrence C. Paulson. Inductive Analysis of the Internet Protocol TLS (Transcript of Discussion) , 1998, Security Protocols Workshop.
[8] Rob Pooley,et al. The unified modelling language , 1999, IEE Proc. Softw..
[9] Jan Jürjens,et al. Specification-Based Testing of Firewalls , 2001, Ershov Memorial Conference.
[10] Jan Jürjens. Modelling Audit Security for Smart-Cart Payment Schemes with UML-SEC , 2001, SEC.
[11] Ivar Jacobson,et al. The unified modeling language reference manual , 2010 .
[12] Ross J. Anderson. Security engineering - a guide to building dependable distributed systems (2. ed.) , 2001 .
[13] Ross J. Anderson. Why cryptosystems fail , 1993, CCS '93.
[14] Dieter Gollmann. On the Verification of Cryptographic Protocols - A Tale of Two Committees , 2000, Electron. Notes Theor. Comput. Sci..
[15] Li Gong,et al. Inside Java 2 Platform Security: Architecture, API Design, and Implementation , 1999 .
[16] Jan Jürjens,et al. Developing Secure Systems with UMLsec — From Business Processes to Implementation , 2001 .
[17] Li Gong. Java Security Architecture (JDK1.2) , 1997 .