Foundations of Security Analysis and Design II
From MaRDI portal
Publication:5901853
DOI10.1007/b95547zbMath1202.68168OpenAlexW4243744343MaRDI QIDQ5901853
Riccardo Focardi, Fabio Martinelli, Roberto Gorrieri
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95547
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (4)
To know or not to know: Epistemic approaches to security protocol verification ⋮ A Formalization of Credit and Responsibility Within the GNDC Schema ⋮ Formal models and analysis of secure multicast in wired and wireless networks ⋮ A comparison of three authentication properties.
This page was built for publication: Foundations of Security Analysis and Design II