![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Hui M.L.
Publisher: Ios Press
ISSN: 0926-227X
Source: Journal of Computer Security, Vol.9, Iss.1-2, 2001-01, pp. : 3-46
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Safely composing security protocols
By Cortier Véronique Delaune Stéphanie
Formal Methods in System Design, Vol. 34, Iss. 1, 2009-02 ,pp. :