Author:
Gawlitza Thomas Martin,Seidl Helmut,Verma Kumar Neeraj
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society, Los Alamitos (2001)
2. Lecture Notes in Computer Science;A. Bouajjani,1997
3. Lecture Notes in Computer Science;A. Bouajjani,2005
4. Dolev, D., Yao, A.C.-C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–207 (1983)
5. Finkel, A., Willems, B., Wolper, P.: A direct symbolic approach to model checking pushdown systems. Electr. Notes Theor. Comput. Sci. 9 (1997)