Verification of cryptographic protocols: tagging enforces termination (Q1770413): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(One intermediate revision by one other user not shown)
Property / DOI
 
Property / DOI: 10.1016/j.tcs.2004.10.018 / rank
Normal rank
 
Property / cites work
 
Property / cites work: Analyzing security protocols with secrecy types and logic programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484507 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4411970 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484506 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer security -- ESORICS 2000. 6th European symposium on research in computer security, Toulouse, France, October 4--6, 2000. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: A logic of authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2754128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4411969 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2763677 / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4263167 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.TCS.2004.10.018 / rank
 
Normal rank

Latest revision as of 11:11, 11 December 2024

scientific article
Language Label Description Also known as
English
Verification of cryptographic protocols: tagging enforces termination
scientific article

    Statements

    Verification of cryptographic protocols: tagging enforces termination (English)
    0 references
    0 references
    0 references
    6 April 2005
    0 references
    Cryptographic protocols
    0 references
    Horn clauses
    0 references
    Resolution
    0 references
    Termination
    0 references
    Tagging
    0 references

    Identifiers