Author:
Alcaide Almudena,Abdallah Ali E.,González–Tablas Ana I.,de Fuentes José M.
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Meadows, C.: Formal methods for cryptographic protocol analysis: emerging issues and trends. IEEE Journal on Selected Areas in Communications 21(1) (2003)
2. Privacy and identity management for europe (prime). Privacy and Identity Management for Europe (PRIME),
https://www.prime-project.eu
3. Burrows, M., Abadi, M., Needham, R.: A logic of authentication. ACM Transactions on Computer Systems 8(1), 18–36 (1990)
4. Abadi, M., Tuttle, M.: A semantics for a logic of authentication. In: Proceedings of the ACM Symposium of Principles of Distributed Computing, pp. 201–216. ACM Press, New York (1991)
5. Moser, L.: A logic of knowledge and belief for reasoning about computer security. In: Proceedings of the Computer Security Foundations Workshop II, pp. 57–63 (June 1989)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献