Distributed temporal logic for the analysis of security protocol models (Q549724): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Changed an Item
Import241208061232 (talk | contribs)
Normalize DOI.
 
(12 intermediate revisions by 7 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.tcs.2011.04.006 / rank
Normal rank
 
Property / author
 
Property / author: David A. Basin / rank
Normal rank
 
Property / author
 
Property / author: David A. Basin / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Casper / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: NRL / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: AVISPA / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: OFMC / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: scyther / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2011.04.006 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2024006228 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure implementation of channel abstractions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A framework for compositional verification of security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: The reactive simulatability (RSIM) framework for asynchronous systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Labelled Tableaux for Distributed Temporal Logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocols for authentification and key establishment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848036 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the semantics of Alice \& Bob specifications of security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4798026 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4804905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417886 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Safely composing security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4415247 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Specifying communication in distributed information systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Protocol Composition via the Authentication Tests / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authentication tests and the structure of bundles. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2767013 / rank
 
Normal rank
Property / cites work
 
Property / cites work: TEMPORAL LOGICS FOR COMMUNICATING SEQUENTIAL AGENTS: I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3785913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The NRL Protocol Analyzer: An Overview / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Pseudonymous Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol Composition Logic (PCL) / rank
 
Normal rank
Property / cites work
 
Property / cites work: A (restricted) quantifier elimination for security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: The CL-Atse Protocol Analyser / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3030239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4857386 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.TCS.2011.04.006 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 21:13, 9 December 2024

scientific article
Language Label Description Also known as
English
Distributed temporal logic for the analysis of security protocol models
scientific article

    Statements

    Distributed temporal logic for the analysis of security protocol models (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    18 July 2011
    0 references
    security protocols
    0 references
    security protocol analysis
    0 references
    security protocol models
    0 references
    temporal logic
    0 references
    distributed temporal logic
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references