T. S. Coffey

Learn More
Users may access full items free of charge; copies of full text items generally can be reproduced, displayed or performed and given to third parties in any format or medium for personal research or study, educational or not­for­profit purposes without prior permission or charge, provided: • The authors, title and full bibliographic details is credited in(More)
The security of electronic networks and information systems is nowadays seen as a critical issue for the growth of information and communication technologies. Cryptographic protocols are used to provide security services such as confidentiality, message integrity, authentication, certified E-mail and non-repudiation. Traditionally, security protocols have(More)
– Formal logics are increasingly used to verify correctness of theories and designs in engineering. However, the process of logic-based verification is complex, tedious and prone to error. This is a serious issue, as a single mistake can render the result of the verification useless. I INTRODUCTION Formal logics have played an important role in many(More)
  • 1