

Author: Accorsi R. Basin D. Vigano L.
Publisher: Elsevier
ISSN: 1571-0661
Source: Electronic Notes in Theoretical Computer Science, Vol.55, Iss.1, 2004-01, pp. : 1-20
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Previous Menu Next
Abstract
Related content










Athena: a novel approach to efficient automatic security protocol analysis
By Song D.X.
Journal of Computer Security, Vol. 9, Iss. 1-2, 2001-01 ,pp. :