Author:
Peroli Michele,Viganò Luca,Zavatteri Matteo
Publisher
Springer International Publishing
Reference20 articles.
1. Lecture Notes in Computer Science;A Armando,2012
2. Basin, D., Caleiro, C., Ramos, J., Viganò, L.: Distributed temporal logic for the analysis of security protocol models. Theor. Comput. Sci. 412(31), 4007–4043 (2011)
3. Lecture Notes in Computer Science;G Bella,2005
4. Bella, G., Bistarelli, S., Massacci, F.: Retaliation against protocol attacks. J. Inf. Assur. Secur. 3, 313–325 (2008)
5. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: Proceedings of CSF’01, pp. 82–96. IEEE CS Press (2001)