Author: Mallya Ashok
Publisher: Springer Publishing Company
ISSN: 1387-2532
Source: Autonomous Agents and Multi-Agent Systems, Vol.14, Iss.2, 2007-04, pp. : 143-163
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
Verifying Compliance with Commitment Protocols
Autonomous Agents and Multi-Agent Systems, Vol. 2, Iss. 3, 1999-09 ,pp. :
The Charleston Advisor, Vol. 10, Iss. 2, 2008-10 ,pp. :
Safely composing security protocols
By Cortier Véronique Delaune Stéphanie
Formal Methods in System Design, Vol. 34, Iss. 1, 2009-02 ,pp. :
Stabilizing time-adaptive protocols
Theoretical Computer Science, Vol. 220, Iss. 1, 1999-06 ,pp. :
Verifying the SET Purchase Protocols
By Bella Giampaolo Massacci Fabio Paulson Lawrence
Journal of Automated Reasoning, Vol. 36, Iss. 1-2, 2006-01 ,pp. :