![]() |
Volumn 2002-January, Issue , 2002, Pages 473-479
|
Role based specification and security analysis of cryptographic protocols using asynchronous product automata
|
Author keywords
Access protocols; Algorithm design and analysis; Authentication; Automata; Cryptographic protocols; Cryptography; Information security; Performance analysis; Power system modeling; State space methods
|
Indexed keywords
AUTHENTICATION;
AUTOMATA THEORY;
EXPERT SYSTEMS;
SECURITY OF DATA;
SPECIFICATIONS;
STATE SPACE METHODS;
ACCESS PROTOCOLS;
ALGORITHM DESIGN AND ANALYSIS;
AUTOMATA;
CRYPTOGRAPHIC PROTOCOLS;
PERFORMANCE ANALYSIS;
POWER SYSTEM MODEL;
CRYPTOGRAPHY;
|
EID: 18444375513
PISSN: 15294188
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/DEXA.2002.1045943 Document Type: Conference Paper |
Times cited : (12)
|
References (13)
|