Publisher
Springer Berlin Heidelberg
Reference44 articles.
1. Needham, R., Schroeder, M.: Using encryption for authentication in large networks of computers. CACM 12, 993–999 (1978)
2. Anderson, R.: Security Engineering. Wiley, Chichester (2001)
3. Paulson, L.: The inductive approach to verifying cryptographic protocols. Journal of Computer Security 6, 85–128 (1998)
4. Huth, M.: Secure Communicating Systems, Cambridge (2001)
5. NATO Science Series;M. Abadi,2000