Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (Q2484410): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(4 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: VAMPIRE / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: NRL / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jlap.2004.09.004 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2034753880 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484507 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2751353 / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417886 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Abstract interpretation and application to logic programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3338216 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2751377 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2723425 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4411842 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Alternating two-way AC-tree automata / rank
 
Normal rank
Property / cites work
 
Property / cites work: Resolution Strategies as Decision Procedures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447232 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: The NRL Protocol Analyzer: An Overview / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4494379 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5678447 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4539622 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724150 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Haskell overloading is DEXPTIME-complete / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Unification Algorithm for Associative-Commutative Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3408138 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447233 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4539595 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2751379 / rank
 
Normal rank

Latest revision as of 13:43, 10 June 2024

scientific article
Language Label Description Also known as
English
Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically
scientific article

    Statements

    Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (English)
    0 references
    0 references
    0 references
    0 references
    1 August 2005
    0 references
    0 references
    Cryptographic protocols
    0 references
    Diffie-Hellman
    0 references
    Resolution
    0 references
    Clause
    0 references
    Associativity
    0 references
    Commutativity
    0 references
    Completeness
    0 references
    Abstraction
    0 references
    Abstract interpretation
    0 references
    Verification
    0 references
    Key exchange
    0 references
    0 references
    0 references
    0 references