Login / Signup

A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols.

Wenbo Mao
Published in: Comput. Stand. Interfaces (2005)
Keyphrases
  • cryptographic protocols
  • mobile robot
  • distributed environment
  • database
  • software engineering
  • security protocols
  • service description