Safely composing security protocols (Q1028731): Difference between revisions

From MaRDI portal
Changed an Item
Import241208061232 (talk | contribs)
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10703-008-0059-4 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: AVISPA / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2027660602 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536407 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484507 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A framework for compositional verification of security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: From One Session to Many: Dynamic Tags for Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounding Messages for Free in Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Security with Global Setup / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of PKCS #11 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security properties: two agents are sufficient / rank
 
Normal rank
Property / cites work
 
Property / cites work: Safely Composing Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding Key Cycles for Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4387317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Efficient Unification Algorithm / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Logic for Programming, Artificial Intelligence, and Reasoning / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10703-008-0059-4 / rank
 
Normal rank

Latest revision as of 13:46, 10 December 2024

scientific article
Language Label Description Also known as
English
Safely composing security protocols
scientific article

    Statements

    Safely composing security protocols (English)
    0 references
    0 references
    0 references
    6 July 2009
    0 references
    composition
    0 references
    security protocols
    0 references
    verification
    0 references
    0 references
    0 references

    Identifiers