Search
Now showing items 1-1 of 1
A structured approach to network security protocol implementation
(2005)
The implementation of network security protocols has not received the same level of attention in the literature as their analysis. Security protocol analysis has successfully used inference logics, like GNY and BAN, and ...