The following pages link to (Q4411970):
Displaying 8 items.
- Deciding knowledge in security protocols under equational theories (Q860894) (← links)
- Verification of cryptographic protocols: tagging enforces termination (Q1770413) (← links)
- Formal analysis and offline monitoring of electronic exams (Q2402552) (← links)
- Automated verification of selected equivalences for security protocols (Q2474047) (← links)
- Breaking and fixing public-key Kerberos (Q2482453) (← links)
- A static analysis of cryptographic processes: the denotational approach (Q2484412) (← links)
- An Introduction to Security API Analysis (Q3092171) (← links)
- Modeling and Verifying Time Sensitive Security Protocols with Constraints (Q5415612) (← links)