Author:
Schneider Steve,Delicata Rob
Publisher
Springer Berlin Heidelberg
Reference51 articles.
1. Lecture Notes in Computer Science;M. Abadi,1997
2. Abadi, M., Gordon, A.D.: A calculus for cryptographic protocols: the spi calculus. Information and Computation (1998); also DEC Research Report 149,(1998)
3. Bistarelli, S., Cervesato, I., Lenzini, G., Martinelli, F.: Relating process algebras and multiset rewriting for security protocol analysis. In: WITS 2003: Workshop on Issues in the Theory of Security (2003)
4. Broadfoot, P.J., Roscoe, A.W.: Proving security protocols with model checkers by data independence techniques. Journal of Computer Security 7(2/3) (1999)
5. Broadfoot, P.J., Roscoe, A.W.: Capturing parallel attacks within the data independence framework. In: Proceedings of the 15th Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (2002)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献