Author:
Shaikh Siraj A.,Bush Vicky J.,Schneider Steve A.
Subject
Law,General Computer Science
Reference29 articles.
1. A calculus for cryptographic protocols: the spi calculus;Abadi;Information and Computation,1999
2. Principles for entity authentication;Bugliesi,2003
3. What do we mean by entity authentication?;Gollmann,1996
4. On the verification of cryptographic protocols - a tale of two committees;Gollmann;Electronic Notes in Theoretical Computer Science (ENTCS),2000
5. Analysing security protocols;Gollmann,2002
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Formal Verification of Security Protocols;Texts in Theoretical Computer Science. An EATCS Series;2022
2. Optimal Decision-making Method of Transportation Route Based on Information Gain;2021 International Wireless Communications and Mobile Computing (IWCMC);2021-06-28
3. Abstractions for security protocol verification;Journal of Computer Security;2018-07-10