000 01645nam a22004455i 4500
001 978-3-540-68136-6
003 DE-He213
005 20130515021537.0
007 cr nn 008mamaa
008 100301s2007 gw | s |||| 0|eng d
020 _a9783540681366
_9978-3-540-68136-6
024 7 _a10.1007/978-3-540-68136-6
_2doi
050 4 _aQA8.9-QA10.3
072 7 _aUYA
_2bicssc
072 7 _aMAT018000
_2bisacsh
082 0 4 _a005.131
_223
100 1 _aBella, Giampaolo.
245 1 0 _aFormal Correctness of Security Protocols
_h[electronic resource] :
_bWith 62 Figures and 4 Tables /
_cby Giampaolo Bella.
260 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2007.
300 _bdigital.
490 0 _aInformation Security and Cryptography, Texts and Monographs,
_x1619-7100
650 0 _aComputer science.
650 0 _aData protection.
650 0 _aData structures (Computer science).
650 0 _aArtificial intelligence.
650 0 _aTelecommunication.
650 1 4 _aComputer Science.
650 2 4 _aMathematical Logic and Formal Languages.
650 2 4 _aData Structures, Cryptology and Information Theory.
650 2 4 _aSystems and Data Security.
650 2 4 _aArtificial Intelligence (incl. Robotics).
650 2 4 _aCommunications Engineering, Networks.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9783540681342
830 0 _aInformation Security and Cryptography, Texts and Monographs,
_x1619-7100
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-540-68136-6
912 _aZDB-2-SCS
999 _c78341
_d78341