Last update: Thu Jun 20 02:01:00 MDT 2019
Top |
Symbols |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Coffey:2003:FVI,
author = "Tom Coffey and Reiner Dojen and Tomas Flanagan",
title = "Formal verification: an imperative step in the design
of security protocols",
journal = j-COMP-NET-AMSTERDAM,
volume = "43",
number = "5",
pages = "601--618",
day = "5",
month = dec,
year = "2003",
CODEN = "????",
ISSN = "1389-1286 (print), 1872-7069 (electronic)",
ISSN-L = "1389-1286",
bibdate = "Wed Nov 5 08:04:39 MST 2003",
bibsource = "http://www.math.utah.edu/pub/tex/bib/compnetamsterdam2000.bib",
acknowledgement = ack-nhfb,
journal-URL = "http://www.sciencedirect.com/science/journal/13891286",
}
Related entries
- design,
32(2)171,
32(6)717,
33(1)1,
33(1)59,
35(4)401,
35(6)627,
37(1)73,
37(2)137,
37(5)507,
38(2)165,
38(4)517,
39(5)577,
39(5)661,
40(5)621,
41(2)247,
41(4)489,
41(5)623,
42(2)175,
42(3)283,
42(3)359,
42(4)461,
43(2)177,
43(3)369,
44(1)17,
44(3)383,
45(3)345,
47(6)847,
48(1)5,
48(6)856,
49(2)172,
49(5)689,
50(2)268,
50(5)599,
50(7)898,
50(8)1086,
50(12)1952,
50(15)2676,
50(15)2747,
50(16)3083,
51(1)94,
51(4)1031,
51(4)1106,
51(6)1684,
51(8)2049,
51(8)2086,
51(9)2311,
51(10)2484,
52(4)795,
52(6)1291,
52(8)1647,
52(10)2077,
52(13)2461,
52(13)2568,
52(16)3119,
53(1)98,
53(11)1784,
53(12)2192,
53(16)2782
- formal,
36(4)407,
37(2)171,
37(3)345,
38(1)99,
42(3)343,
52(2)432
- security,
33(1)77,
34(6)873,
34(6)881,
36(1)87,
37(2)205,
38(2)165,
39(6)827,
43(5)573,
45(2)195,
45(4)483,
46(2)253,
48(5)697,
48(5)739,
50(4)469,
50(13)2225,
50(13)2401,
51(1)1,
51(1)285,
51(3)751,
51(9)2280,
51(16)4697,
51(17)4797,
52(14)2745,
52(15)2908,
53(12)2192
- step,
51(9)2262
- verification,
34(5)799,
45(2)77,
49(5)661,
52(8)1567,
52(14)2713,
53(16)2800