Surrey researchers Sign in
Verifying Security Protocols: An Application of CSP
Book chapter   Open access  Peer reviewed

Verifying Security Protocols: An Application of CSP

Steve Schneider and Robert Delicata
Vol.3525, pp.243-263
04/05/2005

Abstract

pdf
fulltext249.09 kBDownloadView
Text Open Access

Metrics

206 File views/ downloads
29 Record Views

Details

Usage Policy