메뉴 건너뛰기




Volumn 2, Issue , 2005, Pages 507-510

Automatic generation of the C# code for security protocols verified with casper/FDR

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER PROGRAMMING; COMPUTER PROGRAMMING LANGUAGES; NETWORK PROTOCOLS; SECURITY OF DATA;

EID: 33744474077     PISSN: 1550445X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/AINA.2005.128     Document Type: Conference Paper
Times cited : (10)

References (6)
  • 2
    • 33744479613 scopus 로고    scopus 로고
    • Modeling and analysis of security protocols: The CSP approach
    • P.Y.A. Ryan and S. A, Schneider. Modeling and analysis of security protocols: the CSP Approach. Addison-Wesley, 2001.
    • (2001) Addison-Wesley
    • Ryan, P.Y.A.1    Schneider, S.A.2
  • 6
    • 0344875574 scopus 로고    scopus 로고
    • Analysing protocols subject to guessing attacks
    • Gavin Lowe. Analysing Protocols Subject to Guessing Attacks. Journal of Computer Security, 2004.
    • (2004) Journal of Computer Security
    • Lowe, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.