Author:
Gibson-Robinson Thomas,Lowe Gavin
Publisher
Springer Berlin Heidelberg
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Verifying layered security protocols;Journal of Computer Security;2015-07-02
2. Sufficient conditions for vertical composition of security protocols;Proceedings of the 9th ACM symposium on Information, computer and communications security;2014-06-04