Login / Signup
Using Gypsie, Gynger and Visual GNY to Analyse Cryptographic Protocols in SPEAR II.
Elton Saul
Andrew Hutchison
Published in:
Conference on Information Security Management & Small Systems Security (2001)
Keyphrases
</>
cryptographic protocols
standard model
security properties
low cost
database systems
visual features
authentication protocol
encryption decryption