A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946): Difference between revisions

From MaRDI portal
Changed an Item
Import241208061232 (talk | contribs)
Normalize DOI.
 
(9 intermediate revisions by 6 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.jlamp.2016.10.005 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: Akiss / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: FAST / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: LALBLC / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: TAMARIN / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2951996797 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1610.08279 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536407 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A survey of symbolic methods in computational analysis of cryptographic systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Unconditional Soundness: Computationally Complete Symbolic Attacker / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic relational verification for cryptographic implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: CSP and anonymity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Receipt-free secret-ballot elections (extended abstract) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Everlasting Privacy / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formal Verification of e-Auction Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulation based security in the applied pi calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mobile values, new names, and secure communication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decidability and combination results for two notions of knowledge in security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing knowledge in security protocols under convergent equational theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: YAPA / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5389067 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A calculus for cryptographic protocols: The spi calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Barbed bisimulation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4230922 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proof Techniques for Cryptographic Processes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Psi-calculi: a framework for mobile processes with nominal data and logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding equivalence-based properties using constraint solving / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2842870 / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Security Protocols to Pushdown Automata / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Complete Symbolic Bisimilarity for an Extended Spi Calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Decidability of equivalence of symbolic derivations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automating Security Analysis: Symbolic Equivalence of Constraint Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Verification of Equivalence Properties of Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Term Rewriting and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Verification of Equivalence Properties of Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial Order Reduction for Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: From Security Protocols to Pushdown Automata / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: LALBLC A Program Testing the Equivalence of dpda’s / rank
 
Normal rank
Property / cites work
 
Property / cites work: Typing Messages for Free in Security Protocols: The Case of Equivalence Properties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated verification of selected equivalences for security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving More Observational Equivalences with ProVerif / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Folding Variant Narrowing and Optimal Variant Termination / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Protocols, Constraint Systems, and Group Theories / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.JLAMP.2016.10.005 / rank
 
Normal rank

Latest revision as of 19:53, 9 December 2024

scientific article
Language Label Description Also known as
English
A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
scientific article

    Statements

    A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (English)
    0 references
    0 references
    0 references
    22 February 2017
    0 references
    cryptographic protocols
    0 references
    symbolic models
    0 references
    privacy-related properties
    0 references
    behavioural equivalence
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers