Computer security -- ESORICS 2000. 6th European symposium on research in computer security, Toulouse, France, October 4--6, 2000. Proceedings
From MaRDI portal
Publication:2067697
DOI10.1007/10722599zbMath1481.68013OpenAlexW2620826145MaRDI QIDQ2067697
No author found.
Publication date: 18 January 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/10722599
Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to computer science (68-06) Computer security (68M25)
Related Items (2)
Verification of cryptographic protocols: tagging enforces termination ⋮ Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model
This page was built for publication: Computer security -- ESORICS 2000. 6th European symposium on research in computer security, Toulouse, France, October 4--6, 2000. Proceedings