Evaluation of anonymity and confidentiality protocols using theorem proving (Q5962971): Difference between revisions
From MaRDI portal
Set OpenAlex properties. |
Normalize DOI. |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / DOI | |||
Property / DOI: 10.1007/s10703-015-0232-5 / rank | |||
Property / cites work | |||
Property / cites work: An introduction to mathematical logic and type theory: To truth through proof. / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Anonymity Protocols as Noisy Channels / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4023085 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4813520 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4118034 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Assessing security threats of looping constructs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3618853 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On the Formalization of the Lebesgue Integration Theory in HOL / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Formalization of Entropy Measures in HOL / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A theory of type polymorphism in programming / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q5687569 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4813519 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On the Foundations of Quantitative Information Flow / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1007/S10703-015-0232-5 / rank | |||
Normal rank |
Latest revision as of 13:39, 9 December 2024
scientific article; zbMATH DE number 6545752
Language | Label | Description | Also known as |
---|---|---|---|
English | Evaluation of anonymity and confidentiality protocols using theorem proving |
scientific article; zbMATH DE number 6545752 |
Statements
Evaluation of anonymity and confidentiality protocols using theorem proving (English)
0 references
25 February 2016
0 references
information leakage
0 references
anonymity
0 references
confidentiality
0 references
theorem proving
0 references
dependable systems and software
0 references