CSP files
On this page, you can download CSP files that illustrate the technique we discussed in the paper entitled \"Model checking cryptographic protocols subject to combinatorial attack\" of A.W. Roscoe, Toby Smyth and Long Nguyen at the Oxford University Department of Computer Science.
Main Authors: | , |
---|---|
Format: | Journal article |
Published: |
2011
|
_version_ | 1826256493907804160 |
---|---|
author | Roscoe, T Nguyen, L |
author_facet | Roscoe, T Nguyen, L |
author_sort | Roscoe, T |
collection | OXFORD |
description | On this page, you can download CSP files that illustrate the technique we discussed in the paper entitled \"Model checking cryptographic protocols subject to combinatorial attack\" of A.W. Roscoe, Toby Smyth and Long Nguyen at the Oxford University Department of Computer Science. |
first_indexed | 2024-03-06T18:03:06Z |
format | Journal article |
id | oxford-uuid:007d42d4-c7ab-43f4-95e1-2ea321cd2ab1 |
institution | University of Oxford |
last_indexed | 2024-03-06T18:03:06Z |
publishDate | 2011 |
record_format | dspace |
spelling | oxford-uuid:007d42d4-c7ab-43f4-95e1-2ea321cd2ab12022-03-26T08:29:44ZCSP filesJournal articlehttp://purl.org/coar/resource_type/c_dcae04bcuuid:007d42d4-c7ab-43f4-95e1-2ea321cd2ab1Department of Computer Science2011Roscoe, TNguyen, LOn this page, you can download CSP files that illustrate the technique we discussed in the paper entitled \"Model checking cryptographic protocols subject to combinatorial attack\" of A.W. Roscoe, Toby Smyth and Long Nguyen at the Oxford University Department of Computer Science. |
spellingShingle | Roscoe, T Nguyen, L CSP files |
title | CSP files |
title_full | CSP files |
title_fullStr | CSP files |
title_full_unstemmed | CSP files |
title_short | CSP files |
title_sort | csp files |
work_keys_str_mv | AT roscoet cspfiles AT nguyenl cspfiles |