165 papers found
Refreshing results…
Verifying Authentication Protocol Implementations
Download from link.springer.comA Comparison of Additivity Axioms in Timed Transition Systems
Download from www.researchgate.netModelling and analysis of security protocols.
Download from www.researchgate.netProcess algebra and non-interference
Download from epubs.surrey.ac.ukHow to prevent type flaw attacks on security protocols
Download from www.mcs.le.ac.ukAnalysing Time Dependent Security Properties in CSP using PVS
Download from epubs.surrey.ac.ukClassifying and Capturing Timing Requirements
Download from www.researchgate.netCapturing timing requirements formally in AMN
Download from www.researchgate.netUsing a Process Algebra to control B OPERATIONS
Download from www.researchgate.netMissing publications? Read more about our data sources.