Author:
Brucker Achim D.,Mödersheim Sebastian A.
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;A. Armando,2005
2. Armando, A., Compagna, L.: SAT-based Model-Checking for Security Protocols Analysis. Int. J. of Information Security 6(1), 3–32 (2007)
3. Bella, G.: Formal Correctness of Security Protocols. Springer, Heidelberg (2007)
4. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW 2001, pp. 82–96. IEEE Computer Society Press, Los Alamitos (2001)
5. Blanchet, B.: Security protocols: from linear to classical logic by abstract interpretation. Information Processing Letters 95(5), 473–479 (2005)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献