Publisher: Elsevier

Related content
Volume 55, Number 1, January 2004

< previous issue | all issues | next issue >

Favourites:Add to Favourites

Information based reasoning about security protocols
pp. 1-16(16)
Authors: Ramanujam, R.; Suresh, S.P.

Favourites:Add to Favourites

Towards an Awareness-Based Semantics for Security Protocol Analysis
pp. 1-20(20)
Authors: Accorsi, R.; Basin, D.; Vigano, L.

Favourites:Add to Favourites
Favourites:Add to Favourites

Attacking Fair-Exchange Protocols - Parallel Models vs. Trace Models
pp. 1-18(18)
Authors: Aiello, L.C.; Massacci, F.

Favourites:Add to Favourites

Models for an Adversary-Centric Protocol Logic
pp. 1-16(16)
Author: Selinger, P.

Favourites:Add to Favourites

The Practice of Cryptographic Protocol Verification
pp. 1-2(2)
Author: Rusinowitch, M.

Share Content

Access Key

Free Content
Free content
New Content
New content
Open Access Content
Open access content
Subscribed Content
Subscribed content
Free Trial Content
Free trial content
Cookie Policy
X
Cookie Policy
ingentaconnect website makes use of cookies so as to keep track of data that you have filled in. I am Happy with this Find out more