

Beschreibung
This account of an effective methodology for defining and verifying security protocols in network communication includes an accompanying tool set that will be of great interest to researchers and advanced professionals working on critical security protocols. S...