No Cover Image

Journal article 339 views

Specifying authentication using signal events in CSP

Siraj Shaikh Orcid Logo, Vicky J. Bush, Steve A. Schneider

Computers and Security, Volume: 28, Issue: 5, Pages: 310 - 324

Swansea University Author: Siraj Shaikh Orcid Logo

Full text not available from this repository: check for access using links below.

Published in: Computers and Security
ISSN: 0167-4048
Published: Elsevier BV 2009
Online Access: Check full text

URI: https://cronfa.swan.ac.uk/Record/cronfa61051
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2022-10-14T13:19:45Z
last_indexed 2023-01-13T19:21:37Z
id cronfa61051
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2022-10-18T11:52:29.8772949</datestamp><bib-version>v2</bib-version><id>61051</id><entry>2022-09-05</entry><title>Specifying authentication using signal events in CSP</title><swanseaauthors><author><sid>50117e8faac2d0937989e14847105704</sid><ORCID>0000-0002-0726-3319</ORCID><firstname>Siraj</firstname><surname>Shaikh</surname><name>Siraj Shaikh</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2022-09-05</date><deptcode>SCS</deptcode><abstract/><type>Journal Article</type><journal>Computers and Security</journal><volume>28</volume><journalNumber>5</journalNumber><paginationStart>310</paginationStart><paginationEnd>324</paginationEnd><publisher>Elsevier BV</publisher><placeOfPublication/><isbnPrint/><isbnElectronic/><issnPrint>0167-4048</issnPrint><issnElectronic/><keywords>Authentication; Security protocols; CSP; Formal specification; Kerberos</keywords><publishedDay>1</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2009</publishedYear><publishedDate>2009-07-01</publishedDate><doi>10.1016/j.cose.2008.10.001</doi><url/><notes/><college>COLLEGE NANME</college><department>Computer Science</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>SCS</DepartmentCode><institution>Swansea University</institution><apcterm/><funders/><projectreference/><lastEdited>2022-10-18T11:52:29.8772949</lastEdited><Created>2022-09-05T22:46:29.0741615</Created><path><level id="1">Faculty of Science and Engineering</level><level id="2">School of Mathematics and Computer Science - Computer Science</level></path><authors><author><firstname>Siraj</firstname><surname>Shaikh</surname><orcid>0000-0002-0726-3319</orcid><order>1</order></author><author><firstname>Vicky J.</firstname><surname>Bush</surname><order>2</order></author><author><firstname>Steve A.</firstname><surname>Schneider</surname><order>3</order></author></authors><documents/><OutputDurs/></rfc1807>
spelling 2022-10-18T11:52:29.8772949 v2 61051 2022-09-05 Specifying authentication using signal events in CSP 50117e8faac2d0937989e14847105704 0000-0002-0726-3319 Siraj Shaikh Siraj Shaikh true false 2022-09-05 SCS Journal Article Computers and Security 28 5 310 324 Elsevier BV 0167-4048 Authentication; Security protocols; CSP; Formal specification; Kerberos 1 7 2009 2009-07-01 10.1016/j.cose.2008.10.001 COLLEGE NANME Computer Science COLLEGE CODE SCS Swansea University 2022-10-18T11:52:29.8772949 2022-09-05T22:46:29.0741615 Faculty of Science and Engineering School of Mathematics and Computer Science - Computer Science Siraj Shaikh 0000-0002-0726-3319 1 Vicky J. Bush 2 Steve A. Schneider 3
title Specifying authentication using signal events in CSP
spellingShingle Specifying authentication using signal events in CSP
Siraj Shaikh
title_short Specifying authentication using signal events in CSP
title_full Specifying authentication using signal events in CSP
title_fullStr Specifying authentication using signal events in CSP
title_full_unstemmed Specifying authentication using signal events in CSP
title_sort Specifying authentication using signal events in CSP
author_id_str_mv 50117e8faac2d0937989e14847105704
author_id_fullname_str_mv 50117e8faac2d0937989e14847105704_***_Siraj Shaikh
author Siraj Shaikh
author2 Siraj Shaikh
Vicky J. Bush
Steve A. Schneider
format Journal article
container_title Computers and Security
container_volume 28
container_issue 5
container_start_page 310
publishDate 2009
institution Swansea University
issn 0167-4048
doi_str_mv 10.1016/j.cose.2008.10.001
publisher Elsevier BV
college_str Faculty of Science and Engineering
hierarchytype
hierarchy_top_id facultyofscienceandengineering
hierarchy_top_title Faculty of Science and Engineering
hierarchy_parent_id facultyofscienceandengineering
hierarchy_parent_title Faculty of Science and Engineering
department_str School of Mathematics and Computer Science - Computer Science{{{_:::_}}}Faculty of Science and Engineering{{{_:::_}}}School of Mathematics and Computer Science - Computer Science
document_store_str 0
active_str 0
published_date 2009-07-01T04:19:39Z
_version_ 1763754303211700224
score 11.012678