메뉴 건너뛰기




Volumn 2102, Issue , 2001, Pages 241-245

AGVI — automatic generation, verification, and implementation of security protocols

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER AIDED ANALYSIS; JAVA PROGRAMMING LANGUAGE; NETWORK SECURITY; SPECIFICATIONS;

EID: 84958777572     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-44585-4_21     Document Type: Conference Paper
Times cited : (36)

References (12)
  • 6
    • 0030705405 scopus 로고    scopus 로고
    • Automated analysis of cryptographic protocols using mur^.In Proceedings of the 1997 IEEE Symposium on Security and Privacy
    • J. C. Mitchell, M. Mitchell, and U. Stern. Automated analysis of cryptographic protocols using mur^.In Proceedings of the 1997 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, 1997.
    • IEEE Computer Society Press , pp. 1997
    • Mitchell, J.C.1    Mitchell, M.2    Stern, U.3
  • 9
    • 35248869216 scopus 로고    scopus 로고
    • Looking for diamonds in the dessert: Automatic security protocol generation for three-party authentication and key distribution
    • July
    • Adrian Perrig and Dawn Xiaodong Song. Looking for diamonds in the dessert: Automatic security protocol generation for three-party authentication and key distribution. In Proc. of IEEE Computer Security Foundations Workshop CSFW 13, July 2000.
    • (2000) Proc. Of IEEE Computer Security Foundations Workshop CSFW 13
    • Perrig, A.1    Song, D.X.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.