|
Volumn 24, Issue 2, 1990, Pages 35-40
|
Critique of the Burrows, Abadi and Needham logic
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER METATHEORY--FORMAL LOGIC;
DATA PROCESSING--SECURITY OF DATA;
AUTHENTICATION PROTOCOLS;
COMPUTER NETWORKS;
|
EID: 0025405980
PISSN: 01635980
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1145/382258.382789 Document Type: Article |
Times cited : (75)
|
References (2)
|