Surrey researchers Sign in
Verifying authentication protocols in CSP
Journal article   Open access  Peer reviewed

Verifying authentication protocols in CSP

IEEE Transactions on Software Engineering, Vol.24(9), pp.741-758
IEEE Transactions on Software Engineering
01/09/1998

Abstract

Authentication security protocols formal methods CSP verification Needham-Schroeder protocol
pdf
fulltext372.00 kBDownloadView
Text Open Access

Metrics

589 File views/ downloads
21 Record Views

Details

Usage Policy