Author:
Sobrinho Daniele Nantes,Ayala-Rincón Mauricio
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theoretical Computer Science 367(1-2), 2–32 (2006)
2. Baader, F., Nipkow, T.: Term Rewriting and All That. Cambridge University Press, Cambridge (1998)
3. Lecture Notes in Computer Science;V. Bernat,2008
4. Cambridge Tracts in Theoretical Computer Science,2003
5. Bull, J., Otwary, D.J.: The authetication protocol. Technical Report CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, Defense Research Agency (1997)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献