An automatic search for security flaws in key management schemes
- 31 March 1992
- journal article
- Published by Elsevier in Computers & Security
- Vol. 11 (1), 75-89
- https://doi.org/10.1016/0167-4048(92)90222-d
Abstract
No abstract availableKeywords
This publication has 2 references indexed in Scilit:
- Expert systems applied to the analysis of key management schemesComputers & Security, 1987
- The Interrogator: Protocol Secuity AnalysisIEEE Transactions on Software Engineering, 1987