Modeling and Verifying Time Sensitive Security Protocols with Constraints

Ti Zhou, Mengjun Li, Zhoujun Li, Huowang Chen. Modeling and Verifying Time Sensitive Security Protocols with Constraints. Electronic Notes in Theoretical Computer Science, 212:103-118, 2008. [doi]

@article{ZhouLLC08:0,
  title = {Modeling and Verifying Time Sensitive Security Protocols with Constraints},
  author = {Ti Zhou and Mengjun Li and Zhoujun Li and Huowang Chen},
  year = {2008},
  doi = {10.1016/j.entcs.2008.04.056},
  url = {http://dx.doi.org/10.1016/j.entcs.2008.04.056},
  tags = {modeling, protocol, constraints, security},
  researchr = {https://researchr.org/publication/ZhouLLC08%3A0},
  cites = {0},
  citedby = {0},
  journal = {Electronic Notes in Theoretical Computer Science},
  volume = {212},
  pages = {103-118},
}