Cryptographic Protocol Composition via the Authentication Tests (Q3617737): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
ReferenceBot (talk | contribs)
Changed an Item
 
(5 intermediate revisions by 4 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: Casper / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: AVISPA / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-00596-1_22 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1602381506 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A framework for compositional verification of security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Safely Composing Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Searching for Shapes in Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adding Branching to the Strand Space Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Order-sorted algebra. I: Equational deduction for multiple inheritance, overloading, exceptions and partial operations / rank
 
Normal rank
Property / cites work
 
Property / cites work: Trustworthy Global Computing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authentication tests and the structure of bundles. / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 05:44, 29 June 2024

scientific article
Language Label Description Also known as
English
Cryptographic Protocol Composition via the Authentication Tests
scientific article

    Statements