Next:
Analysis of the SSL
Up:
Notes from the Second
Previous:
Smart Cards in Hostile
Session II: Protocol Analysis
Analysis of the SSL 3.0 Protocol
Fast, Automatic Checking of Security Protocols
Verifying Cryptographic Protocols for Electronic Commerce
Alma Whitten
1998-07-21