The following pages link to Tom Coffey (Q1888492):
Displayed 3 items.
- Formal verification: an imperative step in the design of security protocols (Q1888495) (← links)
- Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications (Q3556605) (← links)
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol (Q3613472) (← links)