An NP decision procedure for protocol insecurity with XOR (Q557799): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(3 intermediate revisions by 3 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.tcs.2005.01.015 / rank
Normal rank
 
Property / OpenAlex ID
 
Property / OpenAlex ID: W2013689938 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484507 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535055 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848035 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4804905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447232 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484508 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on a recursive authentication protocol. A cautionary tale / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.TCS.2005.01.015 / rank
 
Normal rank

Latest revision as of 21:27, 9 December 2024

scientific article
Language Label Description Also known as
English
An NP decision procedure for protocol insecurity with XOR
scientific article

    Statements

    An NP decision procedure for protocol insecurity with XOR (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    30 June 2005
    0 references
    Verification
    0 references
    Security
    0 references
    XOR
    0 references
    Protocols
    0 references
    Complexity
    0 references

    Identifiers