메뉴 건너뛰기




Volumn 1381, Issue , 1998, Pages 12-26

A bisimulation method for cryptographic protocols

Author keywords

[No Author keywords available]

Indexed keywords

CRYPTOGRAPHY;

EID: 84947720399     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0053560     Document Type: Conference Paper
Times cited : (27)

References (21)
  • 6
    • 84947725070 scopus 로고
    • Data encryption standard. Fed. Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC, January
    • Data encryption standard. Fed. Inform. Processing Standards Pub. 46, National Bureau of Standards, Washington DC, January 1977.
    • (1977)
  • 12
    • 0342880800 scopus 로고
    • Meadows. Applying formal methods to the analysis of a key management protocol
    • Meadows. Applying formal methods to the analysis of a key management protocol. Journal of Computer Security, 1(1):5-36, 1992.
    • (1992) Journal of Computer Security , vol.1 , Issue.1 , pp. 5-36
  • 15
    • 44049114041 scopus 로고
    • A calculus of mobile processes, parts I and II
    • September
    • R. Milner, J. Parrow, and D. Walker. A calculus of mobile processes, parts I and II. Information and Computation, pages 1-40 and 41-77, September 1992.
    • (1992) Information and Computation , pp. 41-77
    • Milner, R.1    Parrow, J.2    Walker, D.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.