Towards the correctness of security protocols
From MaRDI portal
Recommendations
Cited in
(10)- Update semantics of security protocols
- scientific article; zbMATH DE number 1832233 (Why is no real title available?)
- scientific article; zbMATH DE number 1863380 (Why is no real title available?)
- scientific article; zbMATH DE number 1857525 (Why is no real title available?)
- On the secure implementation of security protocols
- scientific article; zbMATH DE number 2090117 (Why is no real title available?)
- scientific article; zbMATH DE number 2112333 (Why is no real title available?)
- scientific article; zbMATH DE number 7361813 (Why is no real title available?)
- On the correctness of an intrusion-tolerant group communication protocol
- Validating Security Protocols under the General Attacker
This page was built for publication: Towards the correctness of security protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q276469)