Author: Ma Xiaoqi Cheng Xiaochun
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.3, Iss.3, 2008-08, pp. : 183-192
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Verifying Compliance with Commitment Protocols
Autonomous Agents and Multi-Agent Systems, Vol. 2, Iss. 3, 1999-09 ,pp. :
Verifying the SET Purchase Protocols
By Bella Giampaolo Massacci Fabio Paulson Lawrence
Journal of Automated Reasoning, Vol. 36, Iss. 1-2, 2006-01 ,pp. :
Analysis of security protocols as open systems
Theoretical Computer Science, Vol. 290, Iss. 1, 2003-01 ,pp. :