Amanote Research

Amanote Research

    RegisterSign In

A Decidable Analysis of Security Protocols

doi 10.1007/1-4020-8141-3_4
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Michael Rusinowitch
Publisher

Kluwer Academic Publishers


Related search

Comparative Analysis of Wireless Security Protocols and Issues

International Journal of Trend in Scientific Research and Development
2018English

From Dignity to Security Protocols: A Scientometric Analysis of Digital Ethics

Ethics and Information Technology
Computer Science ApplicationsLibraryInformation Sciences
2018English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Verification of Security Protocols

English

The TAMARIN Prover for the Symbolic Analysis of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Reputation-Based Wi-Fi Deployment Protocols and Security Analysis

2004English

Analyzing Internet Security Protocols

English

Analysis of the IBM CCA Security API Protocols in Maude-Npa

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks

2010English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy