Author:
Bella Giampaolo,Bistarelli Stefano,Massacci Fabio
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Lecture Notes in Computer Science;G. Bella,2004
2. Burrows, M., Abadi, M., Needham, R.M.: A logic for authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
3. Aiello, L.C., Massacci, F.: Verifying security protocols as planning in logic programming. ACM Transactions on Computational Logic 2(4), 542–580 (2001)
4. Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y.: Reasoning about Knowledge. The MIT Press, Cambridge (1995)
5. Kemmerer, R., Meadows, C., Millen, J.: Three system for cryptographic protocol analysis. Journal of Cryptology 7(2), 79–130 (1994)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Implementing Security Protocol Monitors;Electronic Proceedings in Theoretical Computer Science;2021-09-06
2. Attack Interference: A Path to Defending Security Protocols;E-Business and Telecommunications;2012