Application of dependency graphs to security protocol analysis
author
Tšahhirov, Ilja
Laud, Peeter
statement of authorship
Ilja Tšahhirov and Peeter Laud
source
Trustworthy global computing
location of publication
Berlin
publisher
Springer
year of publication
2008
pages
p. 294-311 : ill
series
Lecture notes in computer science ; 4912
url
https://link.springer.com/chapter/10.1007/978-3-540-78663-4_20
subject term
krüptograafia
võrguprotokollid
turvalisus
graafid
ISSN
0302-9743
ISBN
978-3-540-7862-7
notes
Bibliogr.: 28 ref
language
inglise