Amanote Research

Amanote Research

    RegisterSign In

Developing Security Protocols by Refinement

doi 10.1145/1866307.1866349
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2010

Authors
Christoph SprengerDavid Basin
Publisher

ACM Press


Related search

Analysing Security Protocols Using Refinement in iUML-B

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2017English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Analyzing Internet Security Protocols

English

Verification of Security Protocols

English

SECFUZZ: Fuzz-Testing Security Protocols

2012English

From Security Protocols to Pushdown Automata

ACM Transactions on Computational Logic
Computational MathematicsTheoretical Computer ScienceComputer ScienceLogic
2015English

AnBx - Security Protocols Design and Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Decidability of Context-Explicit Security Protocols

Journal of Computer Security
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
2005English

A Decidable Analysis of Security Protocols

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy