Bisimulation for Demonic Schedulers (Q3617738): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-642-00596-1_23 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1888841230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A calculus for cryptographic protocols: The spi calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mobile values, new names, and secure communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Making Random Choices Invisible to the Scheduler / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bisimulation for Demonic Schedulers / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONCUR 2005 – Concurrency Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: The dining cryptographers problem: Unconditional sender and recipient untraceability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analyzing security protocols using time-bounded task-PIOAs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Time-Bounded Task-PIOAs: A Framework for Analyzing Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2764140 / rank
 
Normal rank

Latest revision as of 05:44, 29 June 2024