Back to Results
First PageMeta Content
Logic / Computing / Mathematics / Theoretical computer science / Burrows–Abadi–Needham logic / Free variables and bound variables / Π-calculus / Needham–Schroeder protocol / Applied mathematics / Cryptographic protocols / Cryptography / Predicate logic


Journal of Computer Security–721 IOS Press 677 A compositional logic for proving security properties of
Add to Reading List

Document Date: 2003-12-15 20:24:55


Open Document

File Size: 328,29 KB

Share Result on Facebook
UPDATE