|
Volumn 64, Issue 2, 2005, Pages 253-284
|
Verifying security protocols with PVS: Widening the rank function approach
|
Author keywords
CSP; PVS; Rank functions; Security protocol analysis
|
Indexed keywords
ALGORITHMS;
COMPUTATIONAL METHODS;
FUNCTIONS;
MATHEMATICAL MODELS;
OPTIMIZATION;
PROBLEM SOLVING;
CSP;
PVS;
RANK FUNCTION;
SECURITY PROTOCOL ANALYSIS;
SECURITY OF DATA;
|
EID: 20144370847
PISSN: 15678326
EISSN: None
Source Type: Journal
DOI: 10.1016/j.jlap.2004.09.005 Document Type: Article |
Times cited : (15)
|
References (21)
|