![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
BibTeX record journals/entcs/NesiR05
@inproceedings{DBLP:journals/entcs/NesiR05, author = {Monica Nesi and Giuseppina Rucci}, editor = {Pierpaolo Degano and Luca Vigan{\`{o}}}, title = {Formalizing and Analyzing the Needham-Schroeder Symmetric-Key Protocol by Rewriting}, booktitle = {Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, ARSPA@ICALP 2005, Lisbon, Portugal, July 16, 2005}, series = {Electronic Notes in Theoretical Computer Science}, volume = {135}, number = {1}, pages = {95--114}, publisher = {Elsevier}, year = {2005}, url = {https://doi.org/10.1016/j.entcs.2005.06.002}, doi = {10.1016/J.ENTCS.2005.06.002}, timestamp = {Thu, 15 Dec 2022 14:18:39 +0100}, biburl = {https://dblp.org/rec/journals/entcs/NesiR05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.