On the correctness of an intrusion-tolerant group communication protocol
From MaRDI portal
Publication:5897070
DOI10.1007/B93958zbMATH Open1179.68014OpenAlexW219731125MaRDI QIDQ5897070FDOQ5897070
Authors: Mohamed Layouni, Jozef Hooman, Sofiène Tahar
Publication date: 5 February 2010
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b93958
Recommendations
Specification and verification (program logics, model checking, etc.) (68Q60) Authentication, digital signatures and secret sharing (94A62) Network protocols (68M12)
Cited In (1)
Uses Software
This page was built for publication: On the correctness of an intrusion-tolerant group communication protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5897070)