Computer security -- ESORICS 2000. 6th European symposium on research in computer security, Toulouse, France, October 4--6, 2000. Proceedings
DOI10.1007/10722599zbMATH Open1481.68013OpenAlexW2620826145MaRDI QIDQ2067697FDOQ2067697
Authors:
Publication date: 18 January 2022
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/10722599
Proceedings of conferences of miscellaneous specific interest (00B25) Proceedings, conferences, collections, etc. pertaining to computer science (68-06) Computer security (68M25)
Cited In (3)
- Computer security -- ESORICS 98. 5th European symposium on research in computer security, Louvain-la-Neuve, Belgium, September 16--18, 1998 Proceedings
- Formalization in PVS of balancing properties necessary for proving security of the Dolev-Yao cascade protocol model
- Verification of cryptographic protocols: tagging enforces termination
This page was built for publication: Computer security -- ESORICS 2000. 6th European symposium on research in computer security, Toulouse, France, October 4--6, 2000. Proceedings
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2067697)