메뉴 건너뛰기




Volumn 2495, Issue , 2002, Pages 396-400

Analysis of a security protocol in μCRL

(1)  Pang, Jun a  


Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY;

EID: 84925465034     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-36103-0_40     Document Type: Conference Paper
Times cited : (6)

References (12)
  • 3
  • 6
    • 0033746638 scopus 로고    scopus 로고
    • Verification of security protocols using Lotos-method and application
    • G. Leduc and F. Germeau. Verification of security protocols using Lotos-method and application. Computer Communications 23 (2000), 1089–1103.
    • (2000) Computer Communications , vol.23 , pp. 1089-1103
    • Leduc, G.1    Germeau, F.2
  • 9
    • 21644473500 scopus 로고    scopus 로고
    • Efficient on-the-fly model-cheching for regular alternation-free mu-calculus
    • R. Mateescu and M. Sighireanu. Efficient on-the-fly model-cheching for regular alternation-free mu-calculus. In Proc. FMICS’2000, pp. 65–86.
    • Proc. FMICS’2000 , pp. 65-86
    • Mateescu, R.1    Sighireanu, M.2
  • 11
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers
    • R. Needham and M. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM 21 (1978), 120–126.
    • (1978) Communications of the ACM , vol.21 , pp. 120-126
    • Needham, R.1    Schroeder, M.2
  • 12
    • 84948955869 scopus 로고    scopus 로고
    • Analysis of a security protocol in μCRL
    • Amsterdam
    • J. Pang. Analysis of a security protocol in μCRL. Tech. Rep. SEN-R0201, CWI, Amsterdam, 2002.
    • (2002) Tech. Rep. SEN-R0201, CWI
    • Pang, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.