Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability (Q4972166): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Created claim: Wikidata QID (P12): Q127155729, #quickstatements; #temporary_batch_1724739681498 |
||
(3 intermediate revisions by 3 users not shown) | |||
Property / describes a project that uses | |||
Property / describes a project that uses: Coq / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1145/3343508 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2979563688 / rank | |||
Normal rank | |||
Property / Wikidata QID | |||
Property / Wikidata QID: Q127155729 / rank | |||
Normal rank |
Latest revision as of 07:47, 27 August 2024
scientific article; zbMATH DE number 7135665
Language | Label | Description | Also known as |
---|---|---|---|
English | Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability |
scientific article; zbMATH DE number 7135665 |
Statements
Verification Methods for the Computationally Complete Symbolic Attacker Based on Indistinguishability (English)
0 references
22 November 2019
0 references
authentication
0 references
Dolev-Yao model
0 references
computational model
0 references
computational soundness
0 references
first-order logic
0 references
secrecy
0 references