Automatic Methods for Analyzing Non-repudiation Protocols with an Active Intruder
From MaRDI portal
Publication:3619471
DOI10.1007/978-3-642-01465-9_13zbMath1302.68112OpenAlexW2169338279MaRDI QIDQ3619471
Francis Klay, Laurent Vigneron
Publication date: 7 April 2009
Published in: Formal Aspects in Security and Trust (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-01465-9_13
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items