Proving security protocols with model checkers by data independence techniques

Bibliographic Details
Main Author: Roscoe, A
Format: Conference item
Published: IEEE 1998
_version_ 1797086556751659008
author Roscoe, A
author_facet Roscoe, A
author_sort Roscoe, A
collection OXFORD
description
first_indexed 2024-03-07T02:23:48Z
format Conference item
id oxford-uuid:a4e3d0e0-a528-49cb-8128-f3960e338203
institution University of Oxford
last_indexed 2024-03-07T02:23:48Z
publishDate 1998
publisher IEEE
record_format dspace
spelling oxford-uuid:a4e3d0e0-a528-49cb-8128-f3960e3382032022-03-27T02:36:39ZProving security protocols with model checkers by data independence techniquesConference itemhttp://purl.org/coar/resource_type/c_5794uuid:a4e3d0e0-a528-49cb-8128-f3960e338203Department of Computer ScienceIEEE1998Roscoe, A
spellingShingle Roscoe, A
Proving security protocols with model checkers by data independence techniques
title Proving security protocols with model checkers by data independence techniques
title_full Proving security protocols with model checkers by data independence techniques
title_fullStr Proving security protocols with model checkers by data independence techniques
title_full_unstemmed Proving security protocols with model checkers by data independence techniques
title_short Proving security protocols with model checkers by data independence techniques
title_sort proving security protocols with model checkers by data independence techniques
work_keys_str_mv AT roscoea provingsecurityprotocolswithmodelcheckersbydataindependencetechniques