Amanote Research
Register
Sign In
Verification of Security Protocols
doi 10.29007/2dc6
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
Vèronique Cortier
Publisher
EasyChair
Related search
Verification of Security Protocols
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
AnBx - Security Protocols Design and Verification
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Improving Automatic Verification of Security Protocols With XOR
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Using Backward Induction Techniques in (Timed) Security Protocols Verification
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Automated Logic-Based Technique for Formal Verification of Security Protocols
Journal of Advances in Computer Networks
Formal Verification of Netlog Protocols
Protocols for Watermark Verification
IEEE Multimedia
Media Technology
Signal Processing
Hardware
Computer Science Applications
Architecture
Software
Automated Inductive Verification of Parameterized Protocols?
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Modular Verification of Computer Communication Protocols
IEEE Transactions on Communications