Author:
Erbatur Serdar,Escobar Santiago,Kapur Deepak,Liu Zhiqiang,Lynch Christopher A.,Meadows Catherine,Meseguer José,Narendran Paliath,Santiago Sonia,Sasse Ralf
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. IEEE 802.11 Local and Metropolitan Area Networks: Wireless LAN Medium Access Control (MAC) and Physical (PHY) Specifications (1999)
2. Lecture Notes in Computer Science;D. Basin,2003
3. Blanchet, B.: An efficient cryptographic protocol verifier based on Prolog rules. In: CSFW, pp. 82–96. IEEE Computer Society (2001)
4. Bürckert, H.-J., Herold, A., Schmidt-Schauß, M.: On equational theories, unification, and (un)decidability. Journal of Symbolic Computation 8(1/2), 3–49 (1989)
5. Lecture Notes in Computer Science;H. Comon-Lundh,2005
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献