Subject
General Computer Science,Theoretical Computer Science
Reference28 articles.
1. Sat-based model-checking of security protocols using planning graph analysis;Armando,2003
2. Key-agreement in ad-hoc networks;Asokan;Computer Communications,2000
3. New multiparty authentication services and key agreement protocols;Ateniese;IEEE Journal on Selected Areas in Communications,2000
4. D. Basin, S. Mödersheim, and L. Viganò. An on-the-fly model-checker for security protocol analysis. In Proceedings of the 2003 European Symposium on Research in Computer Security, pages 253–270, 2003. Extended version available as Technical Report 404, ETH Zurich
5. G. Bella. Message reception in the inductive approach. Technical Report 460, Computer Laboratory, University of Cambridge, 1999
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献