A Z Based Approach to Verifying Security Protocols

Benjamin W. Long, Colin J. Fidge, Antonio Cerone. A Z Based Approach to Verifying Security Protocols. In Jin Song Dong, Jim Woodcock, editors, Formal Methods and Software Engineering, 5th International Conference on Formal Engineering Methods, ICFEM 2003, Singapore, November 5-7, 2003, Proceedings. Volume 2885 of Lecture Notes in Computer Science, pages 375-395, Springer, 2003. [doi]

@inproceedings{LongFC03,
  title = {A Z Based Approach to Verifying Security Protocols},
  author = {Benjamin W. Long and Colin J. Fidge and Antonio Cerone},
  year = {2003},
  url = {http://springerlink.metapress.com/openurl.asp?genre=article&issn=0302-9743&volume=2885&spage=375},
  tags = {rule-based, protocol, security, systematic-approach},
  researchr = {https://researchr.org/publication/LongFC03},
  cites = {0},
  citedby = {0},
  pages = {375-395},
  booktitle = {Formal Methods and Software Engineering, 5th International Conference on Formal Engineering Methods, ICFEM 2003, Singapore, November 5-7, 2003, Proceedings},
  editor = {Jin Song Dong and Jim Woodcock},
  volume = {2885},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-20461-X},
}