An NP decision procedure for protocol insecurity with XOR (Q557799): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Import241208061232 (talk | contribs)
Normalize DOI.
 
(7 intermediate revisions by 7 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.tcs.2005.01.015 / rank
Normal rank
 
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 68P25 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 2184041 / rank
 
Normal rank
Property / zbMATH Keywords
 
Verification
Property / zbMATH Keywords: Verification / rank
 
Normal rank
Property / zbMATH Keywords
 
Security
Property / zbMATH Keywords: Security / rank
 
Normal rank
Property / zbMATH Keywords
 
XOR
Property / zbMATH Keywords: XOR / rank
 
Normal rank
Property / zbMATH Keywords
 
Protocols
Property / zbMATH Keywords: Protocols / rank
 
Normal rank
Property / zbMATH Keywords
 
Complexity
Property / zbMATH Keywords: Complexity / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2013689938 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484507 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535055 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848035 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4804905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447232 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484508 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on a recursive authentication protocol. A cautionary tale / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.TCS.2005.01.015 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 21:27, 9 December 2024

scientific article
Language Label Description Also known as
English
An NP decision procedure for protocol insecurity with XOR
scientific article

    Statements

    An NP decision procedure for protocol insecurity with XOR (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    30 June 2005
    0 references
    Verification
    0 references
    Security
    0 references
    XOR
    0 references
    Protocols
    0 references
    Complexity
    0 references

    Identifiers