157 papers found
Refreshing results…
Verifying the SET Purchase Protocols
Download from www.researchgate.netMechanizing a Theory of Program Composition for UNITY
Download from www.researchgate.netMechanising BAN Kerberos by the Inductive Method
Download from www.researchgate.netUsing Isabelle to Prove Properties of the Kerberos Authentication System
Download from www.researchgate.netMechanical Proofs about a Non-Repudiation Protocol
Download from www.researchgate.netSET Cardholder Registration: The Secrecy Proofs
Download from www.researchgate.netMaking Sense of Specifications: The Formalization of SET.
Download from www.researchgate.netFormal verification of cardholder registration in SET
Download from www.researchgate.netMechanizing Nonstandard Real Analysis
Download from dx.doi.orgRelations Between Secrets: Two Formal Analyses of the Yahalom Protocol
Download from www.researchgate.netMissing publications? Read more about our data sources.