Team for Research in
Ubiquitous Secure Technology

Secrecy Analysis in Protocol Composition Logic
A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.P. Seifert

Citation
A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.P. Seifert. "Secrecy Analysis in Protocol Composition Logic". Formal Logical Methods for System Security and Correctness, IOS Press, 2008.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.P. Seifert.
    <a href="http://www.truststc.org/pubs/415.html"
    ><i>Secrecy Analysis in Protocol Composition
    Logic</i></a>, Formal Logical Methods for System
    Security and Correctness, IOS Press, 2008.
  • Plain text
    A. Roy, A. Datta, A. Derek, J. C. Mitchell, J.P. Seifert.
    "Secrecy Analysis in Protocol Composition Logic".
    Formal Logical Methods for System Security and Correctness,
    IOS Press, 2008.
  • BibTeX
    @inbook{RoyDattaDerekMitchellSeifert08_SecrecyAnalysisInProtocolCompositionLogic,
        author = {A. Roy and A. Datta and A. Derek and J. C.
                  Mitchell and J.P. Seifert},
        title = {Secrecy Analysis in Protocol Composition Logic},
        publisher = {Formal Logical Methods for System Security and
                  Correctness, IOS Press},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/415.html}
    }
    

Posted by Anupam Datta on 25 Jul 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.