×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [modeling security protocols]
Home >
modeling security protocols
Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to.
215 views
Analyzing Security Protocols using Probabilistic I/O Automata
46 views
1 Nancy Lynch MIT, EECS, CSAIL Workshop on Discrete Event Systems (Wodes ’06) Ann Arbor, Michigan July 11, 2006 Analyzing Security Protocols using Probabilistic.
219 views