×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [modeling security protocols]
Security attacks. - confidentiality: only authorized parties have read access to information - integrity: only authorized parties have write access to
214 views
Analyzing Security Protocols using Probabilistic I/O Automata
45 views
1 Nancy Lynch MIT, EECS, CSAIL Workshop on Discrete Event Systems (Wodes ’06) Ann Arbor, Michigan July 11, 2006 Analyzing Security Protocols using Probabilistic
219 views