Automating Data Independence
- 1 January 2000
- book chapter
- Published by Springer Nature
- p. 175-190
- https://doi.org/10.1007/10722599_11
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- A Unifying Approach to Data-IndependencePublished by Springer Nature ,2000
- Proving security protocols with model checkers by data independence techniquesJournal of Computer Security, 1999
- Using CSP to detect errors in the TMN protocolIEEE Transactions on Software Engineering, 1997
- Model Checking for Security Protocols,Published by Defense Technical Information Center (DTIC) ,1997
- An attack on the Needham-Schroeder public-key authentication protocolInformation Processing Letters, 1995
- A Taxonomy of Replay AttacksPublished by Defense Technical Information Center (DTIC) ,1994
- A logic of authenticationProceedings of the Royal Society of London. Series A. Mathematical and Physical Sciences, 1989