An NP decision procedure for protocol insecurity with XOR (Q557799): Difference between revisions
From MaRDI portal
Created a new Item |
Normalize DOI. |
||
(7 intermediate revisions by 7 users not shown) | |||
Property / DOI | |||
Property / DOI: 10.1016/j.tcs.2005.01.015 / rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 68P25 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 2184041 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
Verification | |||
Property / zbMATH Keywords: Verification / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
Security | |||
Property / zbMATH Keywords: Security / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
XOR | |||
Property / zbMATH Keywords: XOR / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
Protocols | |||
Property / zbMATH Keywords: Protocols / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
Complexity | |||
Property / zbMATH Keywords: Complexity / rank | |||
Normal rank | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2013689938 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4484507 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4536615 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4535055 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2848035 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4804905 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4535056 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On the security of public key protocols / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4418589 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4447232 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4484508 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Using encryption for authentication in large networks of computers / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An attack on a recursive authentication protocol. A cautionary tale / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1016/J.TCS.2005.01.015 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 21:27, 9 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | An NP decision procedure for protocol insecurity with XOR |
scientific article |
Statements
An NP decision procedure for protocol insecurity with XOR (English)
0 references
30 June 2005
0 references
Verification
0 references
Security
0 references
XOR
0 references
Protocols
0 references
Complexity
0 references