Processing math: 100%
39
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Security Protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999. Proceedings 

      Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols

      other
      , , ,
      Springer Berlin Heidelberg

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references25

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Blind Signatures for Untraceable Payments

            Bookmark
            • Record: found
            • Abstract: not found
            • Book Chapter: not found

            The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              A practical secret voting scheme for large scale elections

                Bookmark

                Author and book information

                Book Chapter
                2017
                March 28 2017
                : 117-140
                10.1007/978-3-662-54455-6_6
                ed5316e0-aad2-42a3-94a7-74405892223d
                History

                Comments

                Comment on this book

                Book chapters

                Similar content1,040

                Cited by4