Antzeko izenburuak
-
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
nork: Lowe, G
Argitaratua: (1996) -
An Attack on the Needham−Schroeder Public−Key Authentication Protocol
nork: Lowe, G
Argitaratua: (1995) -
Modelling and verifying key−exchange protocols using CSP and FDR
nork: Roscoe, A
Argitaratua: (1995) -
Analyzing a Library of Security Protocols using Casper and FDR
nork: Donovan, B, et al.
Argitaratua: (1999) -
Recent developments in FDR
nork: Armstrong, P, et al.
Argitaratua: (2012)