The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper

<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that m...

Deskribapen osoa

Xehetasun bibliografikoak
Egile nagusia: Cremers, C
Formatua: Book section
Argitaratua: Springer 2008

Antzeko izenburuak