Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
DOI10.1007/978-3-540-68746-7_9zbMath1143.68476OpenAlexW1585279410MaRDI QIDQ3510858
Elisabeth Pelz, Raymond Devillers, Roland Bouroulet, Hanna Klaudel, Franck Pommereau
Publication date: 3 July 2008
Published in: Applications and Theory of Petri Nets (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-68746-7_9
Specification and verification (program logics, model checking, etc.) (68Q60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Authentication, digital signatures and secret sharing (94A62)
Uses Software
This page was built for publication: Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets