Verifying security protocols by knowledge analysis

Author: Ma Xiaoqi   Cheng Xiaochun  

Publisher: Inderscience Publishers

ISSN: 1747-8405

Source: International Journal of Security and Networks, Vol.3, Iss.3, 2008-08, pp. : 183-192

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract