Edinburgh Research Explorer

Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Standard

Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks. / Steel, G.; Bundy, Alan; Denney, E.

Proceedings of 2002 Workshop on Foundations of Computer Security. 2002. p. 49-58.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Steel, G, Bundy, A & Denney, E 2002, Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks. in Proceedings of 2002 Workshop on Foundations of Computer Security. pp. 49-58, Proceedings of 2002 Workshop on Foundations of Computer Security, Copenhagen, Denmark, 25/07/02.

APA

Steel, G., Bundy, A., & Denney, E. (2002). Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks. In Proceedings of 2002 Workshop on Foundations of Computer Security (pp. 49-58)

Vancouver

Steel G, Bundy A, Denney E. Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks. In Proceedings of 2002 Workshop on Foundations of Computer Security. 2002. p. 49-58.

Author

Steel, G. ; Bundy, Alan ; Denney, E./ Finding Counterexamples to Inductive Conjectures and Discovering Security Protocol Attacks. Proceedings of 2002 Workshop on Foundations of Computer Security. 2002. pp. 49-58