Author:
Basagiannis Stylianos,Katsaros Panagiotis,Pombortsis Andrew
Subject
Law,General Computer Science
Reference39 articles.
1. On name generation and set-based analysis in the Dolev–Yao model;Amadio,2002
2. Armando A, Compagna L. An optimized intruder model for SAT-based model-checking of security protocols. In: Proc. of the workshop on automated reasoning for security protocol analysis ARSPA, ENTCS; 2004. p. 91–108.
3. Intrusion attack tactics for the model checking of e-commerce security guarantees;Basagiannis,2007
4. Probabilistic model checking for the quantification of DoS security threats;Basagiannis;Computers & Security,2009
5. OFMC: a symbolic model-checker for security protocols;Basin;International Journal of Information Security,2004
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献