Edinburgh Research Explorer

Using the coral System to Discover Attacks on Security Protocols

Research output: Chapter in Book/Report/Conference proceedingChapter

Standard

Using the coral System to Discover Attacks on Security Protocols. / Bundy, Alan.

Computer Systems: Theory, Technology and Applications. ed. / A. Herbert; K. Sp¨arck Jones. Springer-Verlag GmbH, 2004.

Research output: Chapter in Book/Report/Conference proceedingChapter

Harvard

Bundy, A 2004, Using the coral System to Discover Attacks on Security Protocols. in A Herbert & K Sp¨arck Jones (eds), Computer Systems: Theory, Technology and Applications. Springer-Verlag GmbH.

APA

Bundy, A. (2004). Using the coral System to Discover Attacks on Security Protocols. In A. Herbert, & K. Sp¨arck Jones (Eds.), Computer Systems: Theory, Technology and Applications Springer-Verlag GmbH.

Vancouver

Bundy A. Using the coral System to Discover Attacks on Security Protocols. In Herbert A, Sp¨arck Jones K, editors, Computer Systems: Theory, Technology and Applications. Springer-Verlag GmbH. 2004

Author

Bundy, Alan. / Using the coral System to Discover Attacks on Security Protocols. Computer Systems: Theory, Technology and Applications. editor / A. Herbert ; K. Sp¨arck Jones. Springer-Verlag GmbH, 2004.