|
Volumn , Issue , 1995, Pages 108-115
|
Using temporal logic to specify and verify cryptographic protocols
|
Author keywords
[No Author keywords available]
|
Indexed keywords
SECURITY ANALYSIS;
STANDARD SAFETY PROPERTIES;
SYSTEM PENETRATORS;
TEMPORAL LOGIC;
ALGEBRA;
CRYPTOGRAPHY;
FORMAL LOGIC;
MATHEMATICAL MODELS;
SECURITY OF DATA;
SYSTEMS ANALYSIS;
NETWORK PROTOCOLS;
|
EID: 0029528751
PISSN: 10636900
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (18)
|
References (11)
|