![]() |
Volumn 3668, Issue , 2005, Pages 439-440
|
PS-LTL for constraint-based security protocol analysis
a
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CONSTRAINT THEORY;
INFORMATION ANALYSIS;
KNOWLEDGE REPRESENTATION;
LOGIC PROGRAMMING;
PROBLEM SOLVING;
REQUIREMENTS ENGINEERING;
SECURITY OF DATA;
CONSTRAINT SOLVING;
FINITE NUMBER;
REQUIREMENT LANGUAGES;
SECURITY PROTOCOLS;
NETWORK PROTOCOLS;
|
EID: 27144466741
PISSN: 03029743
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1007/11562931_46 Document Type: Conference Paper |
Times cited : (3)
|
References (12)
|