Publisher: Elsevier

Related content
Volume 55, Number 1, January 2004

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Information based reasoning about security protocols
pp. 1-16(16)
Authors: Ramanujam, R.; Suresh, S.P.

Favourites:Add to Favourites

Towards an Awareness-Based Semantics for Security Protocol Analysis
pp. 1-20(20)
Authors: Accorsi, R.; Basin, D.; Vigano, L.

Favourites:Add to Favourites
Favourites:Add to Favourites

Attacking Fair-Exchange Protocols - Parallel Models vs. Trace Models
pp. 1-18(18)
Authors: Aiello, L.C.; Massacci, F.

Favourites:Add to Favourites

Models for an Adversary-Centric Protocol Logic
pp. 1-16(16)
Author: Selinger, P.

Favourites:Add to Favourites

The Practice of Cryptographic Protocol Verification
pp. 1-2(2)
Author: Rusinowitch, M.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more