{"_id":"5AJ587aEYfqtMK8hA","bibbaseid":"armando-carbone-zanetti-formalmodelingandautomaticsecurityanalysisoftwofactorandtwochannelauthenticationprotocols-2013","downloads":0,"creationDate":"2016-08-26T09:24:46.846Z","title":"Formal modeling and automatic security analysis of two-factor and two-channel authentication protocols","author_short":["Armando, A.","Carbone, R.","Zanetti, L."],"year":2013,"bibtype":"article","biburl":"https://dl.dropboxusercontent.com/u/1703583/BiblioLab.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Armando"],"firstnames":["A."],"suffixes":[]},{"propositions":[],"lastnames":["Carbone"],"firstnames":["R."],"suffixes":[]},{"propositions":[],"lastnames":["Zanetti"],"firstnames":["L."],"suffixes":[]}],"title":"Formal modeling and automatic security analysis of two-factor and two-channel authentication protocols","journal":"Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","year":"2013","volume":"7873 LNCS","pages":"728-734","doi":"10.1007/978-3-642-38631-2_63","url":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883441144&partnerID=40&md5=42208a86457214d9ed6acf1d93187473","document_type":"Conference Paper","source":"Scopus","bibtex":"@ARTICLE{Armando2013728,\nauthor={Armando, A., Carbone, R., Zanetti, L.},\ntitle={Formal modeling and automatic security analysis of two-factor and two-channel authentication protocols},\njournal={Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)},\nyear={2013},\nvolume={7873 LNCS},\npages={728-734},\ndoi={10.1007/978-3-642-38631-2_63},\nurl={https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883441144&partnerID=40&md5=42208a86457214d9ed6acf1d93187473},\ndocument_type={Conference Paper},\nsource={Scopus},\n}\n\n","author_short":["Armando, A.","Carbone, R.","Zanetti, L."],"key":"Armando2013728","id":"Armando2013728","bibbaseid":"armando-carbone-zanetti-formalmodelingandautomaticsecurityanalysisoftwofactorandtwochannelauthenticationprotocols-2013","role":"author","urls":{"Paper":"https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883441144&partnerID=40&md5=42208a86457214d9ed6acf1d93187473"},"downloads":0},"search_terms":["formal","modeling","automatic","security","analysis","two","factor","two","channel","authentication","protocols","armando","carbone","zanetti"],"keywords":["dblp"],"authorIDs":[],"dataSources":["EQov9rEvkmMf5P4ah"]}