Author: Buchholtz Mikael Riis Nielson Hanne Nielson Flemming
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.2, Iss.3-4, 2004-08, pp. : 145-167
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
Analysis of security protocols as open systems
Theoretical Computer Science, Vol. 290, Iss. 1, 2003-01 ,pp. :
Model checking security properties of control flow graphs
By Besson F.
Journal of Computer Security, Vol. 9, Iss. 3, 2001-01 ,pp. :