1. Protocols for authentication and key establishment

by Boyd, Colin | Mathuria, Anish.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer-Verlag, 2003Availability: Items available for loan: [Call number: 005.82 BOY] (2).
2. Rethinking public key infrastructures and digital certificates: Building in privacy

by Brands, Stefan A.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Cambridge: The MIT Press, 2000Availability: Items available for loan: [Call number: 005.8 BRA] (2).
3. Formal correctness of security protocols

by Bella, Giampaolo.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Berlin: Springer, 2007Availability: Items available for loan: [Call number: 005.82 BEL] (1).

Powered by Koha