Filter your results
- 2
- 2
- 2
- 2
- 1
- 1
- 2
- 1
- 2
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Using Backward Induction Techniques in (Timed) Security Protocols Verification12th International Conference on Information Systems and Industrial Management (CISIM), Sep 2013, Krakow, Poland. pp.265-276, ⟨10.1007/978-3-642-40925-7_25⟩
Conference papers
hal-01496073v1
|
||
|
Verification of Mutual Authentication Protocol for MobInfoSec System14th Computer Information Systems and Industrial Management (CISIM), Sep 2015, Warsaw, Poland. pp.461-474, ⟨10.1007/978-3-319-24369-6_38⟩
Conference papers
hal-01444488v1
|