Sciweavers

TPHOL   2003 International Workshop on the HOL Theorem Proving System and its Applications
Wall of Fame | Most Viewed TPHOL-2003 Paper
TPHOL
2003
IEEE
13 years 9 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of cla...
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source173
2Download preprint from source131
3Download preprint from source125
4Download preprint from source124
5Download preprint from source114
6Download preprint from source100
7Download preprint from source97
8Download preprint from source97
9Download preprint from source89
10Download preprint from source88
11Download preprint from source88
12Download preprint from source71
13Download preprint from source68