Zoekresultaten
Resultaat 1 - 6 (van 6)
R. Corin Analysis models for security protocols
Non-fictie
Engels | 168 pagina's | 2006
Gedrukt boek
J.G. Cederquist | R. Corin | M.T. Dashti On the quest for impartiality
design and analysis of a fair non-repudiation protocol
Non-fictie
Engels | 46 pagina's | Centre for Telematics and Information Technology, University of Twente, Enschede | 2005
Gedrukt boek
R. Corin | S. Etalle A simple procedure for finding guessing attacks
Non-fictie
Engels | 8 pagina's | Centre for Telematics and Information Technology, University of Twente, Enschede | 2004
Gedrukt boek
P. Laud | R. Corin Sound computational interpretation of formal encryption with composed keys
Non-fictie
Engels | 12 pagina's | Centre for Telematics and Information Technology, University of Twente, Enschede | 2003
Gedrukt boek
R. Corin | J. Doumen | S. Etalle Analysing password protocol security against off-line dictionary attacks
Non-fictie
Engels | 19 pagina's | Centre for Telematics and Information Technology, University of Twente, Enschede | 2003
Gedrukt boek
R. Corin | S. Etalle An improved constraint-based system for the verification of security protocols
Non-fictie
Engels | 18 pagina's | Centre for Telematics and Information Technology, University of Twente, Enschede | 2002
Gedrukt boek