Timed models of security protocols including delays in the network
Main Authors: | Sabina Szymoniak, Mirosław Kurkowski, Jacek Piątkowski |
---|---|
Format: | Article |
Language: | English |
Published: |
The Publishing Office of Czestochowa University of Technology
2015-09-01
|
Series: | Journal of Applied Mathematics and Computational Mechanics |
Online Access: |
http://amcm.pcz.pl/get.php?article=2015_3/art_14.pdf
|
Similar Items
-
SAT and SMT-Based Verification of Security Protocols Including Time Aspects
by: Sabina Szymoniak, et al.
Published: (2021-04-01) -
Security protocols analysis including various time parameters
by: Sabina Szymoniak
Published: (2021-04-01) -
Using probabilistic automata for security protocols verification
by: Olga Siedlecka-Lamch, et al.
Published: (2016-06-01) -
Multifactor Authentication Protocol in a Mobile Environment
by: Bartlomiejczyk Maciej, et al.
Published: (2019-01-01) -
Attacking and securing Network Time Protocol
by: Malhotra, Aanchal
Published: (2020)