AnBx -

Security Protocols Design and Verification

Michele Bugliesi, Paolo Modesti

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

6 Downloads (Pure)
Original languageEnglish
Title of host publicationRevised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010.
Subtitle of host publicationAutomated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop
EditorsAlessandro Armando, Gavin Lowe
PublisherSpringer
Pages164-184
Number of pages21
Volume6186
DOIs
Publication statusPublished - 2010
EventAutomated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop - Paphos, Cyprus
Duration: 27 Mar 201028 Mar 2010

Publication series

NameLecture Notes in Computer Science
PublisherSpringer

Conference

ConferenceAutomated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop
Abbreviated titleARSPA-WITS 2010
CountryCyprus
CityPaphos
Period27/03/1028/03/10

Cite this

Bugliesi, M., & Modesti, P. (2010). AnBx -: Security Protocols Design and Verification. In A. Armando, & G. Lowe (Eds.), Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. : Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop (Vol. 6186, pp. 164-184). (Lecture Notes in Computer Science). Springer. https://doi.org/10.1007/978-3-642-16074-5_12
Bugliesi, Michele ; Modesti, Paolo. / AnBx - : Security Protocols Design and Verification. Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. : Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop. editor / Alessandro Armando ; Gavin Lowe. Vol. 6186 Springer, 2010. pp. 164-184 (Lecture Notes in Computer Science).
@inproceedings{813c2966349041f1a71ebf5c3072e8ae,
title = "AnBx -: Security Protocols Design and Verification",
author = "Michele Bugliesi and Paolo Modesti",
year = "2010",
doi = "10.1007/978-3-642-16074-5_12",
language = "English",
volume = "6186",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "164--184",
editor = "Alessandro Armando and Gavin Lowe",
booktitle = "Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010.",

}

Bugliesi, M & Modesti, P 2010, AnBx -: Security Protocols Design and Verification. in A Armando & G Lowe (eds), Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. : Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop. vol. 6186, Lecture Notes in Computer Science, Springer, pp. 164-184, Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop, Paphos, Cyprus, 27/03/10. https://doi.org/10.1007/978-3-642-16074-5_12

AnBx - : Security Protocols Design and Verification. / Bugliesi, Michele; Modesti, Paolo.

Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. : Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop. ed. / Alessandro Armando; Gavin Lowe. Vol. 6186 Springer, 2010. p. 164-184 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contributionResearch

TY - GEN

T1 - AnBx -

T2 - Security Protocols Design and Verification

AU - Bugliesi, Michele

AU - Modesti, Paolo

PY - 2010

Y1 - 2010

U2 - 10.1007/978-3-642-16074-5_12

DO - 10.1007/978-3-642-16074-5_12

M3 - Conference contribution

VL - 6186

T3 - Lecture Notes in Computer Science

SP - 164

EP - 184

BT - Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010.

A2 - Armando, Alessandro

A2 - Lowe, Gavin

PB - Springer

ER -

Bugliesi M, Modesti P. AnBx -: Security Protocols Design and Verification. In Armando A, Lowe G, editors, Revised Selected Papers , ARSPA-WITS 2010, Paphos, Cyprus, March 27-28, 2010. : Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security - Joint Workshop. Vol. 6186. Springer. 2010. p. 164-184. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-642-16074-5_12