![Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing Dolev-Yao model / Public-key cryptography / Email / Needham–Schroeder protocol / Cryptographic protocols / Cryptography / Computing](https://www.pdfsearch.io/img/65cc0b305a35065ce716adc488a75f29.jpg) Date: 2014-12-01 09:19:17Dolev-Yao model Public-key cryptography Email Needham–Schroeder protocol Cryptographic protocols Cryptography Computing | | Verifying Security Protocols: An ASM Approach. Dominik Haneberg, Holger Grandy, Wolfgang Reif, Gerhard Schellhorn Lehrstuhl f¨ ur Softwaretechnik und Programmiersprachen Institut f¨Add to Reading ListSource URL: www.isse.uni-augsburg.deDownload Document from Source Website File Size: 193,46 KBShare Document on Facebook
|