Amanote Research

Amanote Research

    RegisterSign In

AnBx - Security Protocols Design and Verification

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-16074-5_12
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2010

Authors
Michele BugliesiPaolo Modesti
Publisher

Springer Berlin Heidelberg


Related search

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Verification of Security Protocols

English

Improving Automatic Verification of Security Protocols With XOR

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Using Backward Induction Techniques in (Timed) Security Protocols Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Automated Logic-Based Technique for Formal Verification of Security Protocols

Journal of Advances in Computer Networks
2018English

A Refinement Approach to Design and Verification of On-Chip Communication Protocols

2008English

Protocols for Watermark Verification

IEEE Multimedia
Media TechnologySignal ProcessingHardwareComputer Science ApplicationsArchitectureSoftware
2001English

Formal Verification of Netlog Protocols

2012English

A Review on the Verification Approaches and Tools Used to Verify the Correctness of Security Algorithms and Protocols

International Journal of Advanced Computer Science and Applications
Computer Science
2019English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy