Author: Kendall Susan K.
Publisher: The Charleston Company
ISSN: 1525-4003
Source: The Charleston Advisor, Vol.10, Iss.2, 2008-10, pp. : 33-36
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
The Charleston Advisor, Vol. 11, Iss. 3, 2010-01 ,pp. :
The Charleston Advisor, Vol. 12, Iss. 2, 2010-10 ,pp. :
Safely composing security protocols
By Cortier Véronique Delaune Stéphanie
Formal Methods in System Design, Vol. 34, Iss. 1, 2009-02 ,pp. :
An algebra for commitment protocols
By Mallya Ashok
Autonomous Agents and Multi-Agent Systems, Vol. 14, Iss. 2, 2007-04 ,pp. :
Verifying Compliance with Commitment Protocols
Autonomous Agents and Multi-Agent Systems, Vol. 2, Iss. 3, 1999-09 ,pp. :