Slični predmeti
-
Breaking and Fixing the Needham−Schroeder Public−Key Protocol Using FDR
od: Lowe, G
Izdano: (1996) -
An Attack on the Needham−Schroeder Public−Key Authentication Protocol
od: Lowe, G
Izdano: (1995) -
Modelling and verifying key−exchange protocols using CSP and FDR
od: Roscoe, A
Izdano: (1995) -
Analyzing a Library of Security Protocols using Casper and FDR
od: Donovan, B, i dr.
Izdano: (1999) -
Recent developments in FDR
od: Armstrong, P, i dr.
Izdano: (2012)