Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties.
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis, the Inductive Method in the theorem prover Isabelle, turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
This book will benefit researchers and graduate students in the fields of formal methods, information security, inductive methods, and networking.
NanoBioEngineering (Volume 2)
Nanodelivery of drugs is an area of growing interest. Some key factors such as small size and high
surface area, along with drug loading capability, make these ideal drug delivery systems. These can
easily be modified to cater to diverse therapeutic and diagnostic applications. Nanoparticles bridge
the gap between biomedical and... Gilded Youth: Privilege, Rebellion and the British Public School
The British public school is an iconic institution, a training ground for the ruling elite and a symbol of national identity and tradition. But beyond the elegant architecture and evergreen playing fields is a turbulent history of teenage rebellion, sexual dissidence, and political radicalism. James Brooke-Smith wades into the...
Sports Psychology For Dummies
Sports psychology is a relatively new field, but it’s one of the fastest-growing areas in sports performance. Professional sports are big money, and teams want a return on their investment in their players. So it should come as no surprise that every NFL, NBA, MLB, and NHL team employs someone trained in sports psychology to assist them...
Windows PowerShell 3.0 Step by Step (Step by Step Developer)
Your hands-on, step-by-step guide to automating Windows administration with Windows PowerShell 3.0
Teach yourself the fundamentals of Windows PowerShell 3.0 command line interface and scripting language—one step at a time. Written by a leading scripting expert, this practical tutorial delivers learn-by-doing exercises,...
Why Does My Bird Do That: A Guide to Parrot Behavior
In this updated edition of the popular guide to parrot behavior, you’ll learn why your bird does strange things and discover positive techniques for modifying those behaviors. You'll get information on training and caring for your bird, normal behavior, and species-specific behavior. Don’t let your feathers get ruffled by a...