Amanote Research
Register
Sign In
Developing Security Protocols by Refinement
doi 10.1145/1866307.1866349
Full Text
Open PDF
Abstract
Available in
full text
Date
January 1, 2010
Authors
Christoph Sprenger
David Basin
Publisher
ACM Press
Related search
Analysing Security Protocols Using Refinement in iUML-B
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Verification of Security Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Analyzing Internet Security Protocols
Verification of Security Protocols
SECFUZZ: Fuzz-Testing Security Protocols
From Security Protocols to Pushdown Automata
ACM Transactions on Computational Logic
Computational Mathematics
Theoretical Computer Science
Computer Science
Logic
AnBx - Security Protocols Design and Verification
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Decidability of Context-Explicit Security Protocols
Journal of Computer Security
Risk
Computer Networks
Hardware
Communications
Reliability
Safety
Architecture
Quality
Software
A Decidable Analysis of Security Protocols