Computer Science ›› 2008, Vol. 35 ›› Issue (2): 109-114.

Previous Articles     Next Articles

  

  • Online:2018-11-16 Published:2018-11-16

Abstract: The electronic commerce protocols often have more complex structures than authentication protocols, and a protocol might be composite of multiple sub-protocols, so the security analysis of electronic commerce protocols is more complex than the analysis of

Key words: Strand space, Electronic commerce protocol, Fairness, Strand node path

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!