Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Clarke, E.M., Jha, S., Marrero, W.: Using state space exploration and a natural deduction style message derivation engine to verify security protocols. In: Proc. IFIP Working Conference on Programming Concepts, and Methods (PROCOMET) (June 1998)
2. CWB. The Edinburgh Concurrency Workbench, Available at
http://www.dcs.ed.ac.uk/home/cwb/
3. Denning, D., Sacco, G.: Timestamps in key distribution protocols. Communications of the ACM 24(8), 533–536 (1981)
4. Dolev, D., Yao, A.C.: On the security of public key protocols. In: Proceedings of the IEEE 22nd Annual Symposium on Foundations of Computer Science, pp. 350–357 (1981)
5. Hennessy, M.: Algebraic Theory of Processes. The MIT Press, Cambridge (1988)
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献