Contributing authors

Preface Peter Ryan and Steve Schneider
Introduction Peter Ryan
Chapter 1 Bill Roscoe
Chapter 2 Bill Roscoe
Chapter 3 Steve Schneider
Chapter 4 Michael Goldsmith
Chapter 5 Gavin Lowe
Chapter 6 Michael Goldsmith
Chapter 7 Steve Schneider
Chapter 8 Gavin Lowe
Chapter 9 Peter Ryan
Chapter 10 Peter Ryan
Appendix A Peter Ryan
Appendix B Tool generated
Appendix C Steve Schneider

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.