Sciweavers

COMPSEC   2010
Wall of Fame | Most Viewed COMPSEC-2010 Paper
COMPSEC
2010
146views more  COMPSEC 2010»
13 years 11 months ago
An intruder model with message inspection for model checking security protocols
Model checking security protocols is based on an intruder model that represents the eavesdropping or interception of the exchanged messages, while at the same time performs attack...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source146
2Download preprint from source142
3Download preprint from source129
4Download preprint from source124
5Download preprint from source124
6Download preprint from source122
7Download preprint from source100
8Download preprint from source98
9Download preprint from source93
10Download preprint from source93
11Download preprint from source86
12Download preprint from source81
13Download preprint from source67