Author:
Mödersheim Sebastian,Viganò Luca
Publisher
Springer Berlin Heidelberg
Reference27 articles.
1. Abadi, M., Fournet, C., Gonthier, G.: Secure Implementation of Channel Abstractions. Information and Computation 174(1), 37–83 (2002)
2. Andova, S., Cremers, C., Gjøsteen, K., Mauw, S., Mjølsnes, S., Radomirović, S.: A framework for compositional verification of security protocols. Information and Computation 206, 425–459 (2008)
3. Lecture Notes in Computer Science;A. Armando,2005
4. Armando, A., Carbone, R., Compagna, L.: LTL Model Checking for Security Protocols. In: Proc. CSFW 2007, pp. 385–396. IEEE CS Press, Los Alamitos (2007)
5. AVISPA. Deliverable 2.3: The Intermediate Format (2003), http://www.avispa-project.org
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献