Back to Results
First PageMeta Content
Philosophical logic / Formal languages / Predicate logic / Burrows–Abadi–Needham logic / Interpretation / Modal logic / First-order logic / Kerberos / Substitution / Logic / Propositional calculus / Model theory


IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS—PART B: CYBERNETICS, VOL. 39, NO. 4, AUGUST[removed]
Add to Reading List

Document Date: 2010-06-29 02:42:57


Open Document

File Size: 422,69 KB

Share Result on Facebook

Company

Needham / BBob / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

Macquarie University / Griffith University / /

IndustryTerm

agent systems / authentication protocol / secure systems / authentication systems / multiagent systems / electronic commerce protocols / belief operator / communication systems / verification tools / symmetric key protocol / wide-mouthed frog protocol / communication protocols / temporal operators / authentication protocols / security protocols / expert systems / /

OperatingSystem

L3 / /

Organization

Griffith University / Brisbane / Macquarie University / Institute for Integrated / Department of Computing / Macquarie University / Sydney / Australian Research Council / Institute for Integrated and Intelligent Systems / /

Person

Schroeder Symmetric Key / Mehmet A. Orgun / Mtml / Abdul Sattar Abstract / Y. Wang / /

Position

Editor / model / Sergeant / forward / /

Product

K5 / N6 / W1 / MASs / W3 / /

ProvinceOrState

Massachusetts / /

Technology

encryption / authentication protocol / symmetric key protocol / verifying authentication protocols / ANALYSIS OF AUTHENTICATION PROTOCOLS / using communication protocols / authentication protocols / electronic commerce protocols / communication protocols / Digital Object Identifier / analyzing security protocols / wide-mouthed frog protocol / /

SocialTag