Títulos similares
-
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
por: Lowe, G
Publicado: (1996) -
An Attack on the Needham−Schroeder Public−Key Authentication Protocol
por: Lowe, G
Publicado: (1995) -
Modelling and verifying key−exchange protocols using CSP and FDR
por: Roscoe, A
Publicado: (1995) -
Analyzing a Library of Security Protocols using Casper and FDR
por: Donovan, B, et al.
Publicado: (1999) -
Recent developments in FDR
por: Armstrong, P, et al.
Publicado: (2012)