Author:
Arsac Wihem,Bella Giampaolo,Chantry Xavier,Compagna Luca
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Bella, G.: The Rational Attacker (2008) (invited talk at SAP Research France, Sophia Antipolis),
http://www.dmi.unict.it/~giamp/Seminars/rationalattackerSAP08.pdf
2. Lecture Notes in Computer Science;A. Armando,2005
3. Armando, A., Compagna, L.: SAT-based Model-Checking for Security Protocols Analysis. International Journal of Information Security 7(1), 3–32 (2008)
4. Abadi, M., Gordon, A.: A calculus for cryptographic protocols: the spi calculus. Information and Computation 148(1), 1–70 (1999)
5. Ryan, P.Y.A., Schneider, S., Goldsmith, M., Lowe, G., Roscoe, A.W.: Modelling and Analysis of Security Protocols. In: AW (2001)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献