Verification of cryptographic protocols: tagging enforces termination (Q1770413): Difference between revisions
From MaRDI portal
Set OpenAlex properties. |
Normalize DOI. |
||
(One intermediate revision by one other user not shown) | |||
Property / DOI | |||
Property / DOI: 10.1016/j.tcs.2004.10.018 / rank | |||
Property / cites work | |||
Property / cites work: Analyzing security protocols with secrecy types and logic programs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4484507 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4411970 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4484506 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Computer security -- ESORICS 2000. 6th European symposium on research in computer security, Toulouse, France, October 4--6, 2000. Proceedings / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A logic of authentication / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2754128 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4535056 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4447230 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4411969 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4418589 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Using encryption for authentication in large networks of computers / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2763677 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4263167 / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1016/J.TCS.2004.10.018 / rank | |||
Normal rank |
Latest revision as of 11:11, 11 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Verification of cryptographic protocols: tagging enforces termination |
scientific article |
Statements
Verification of cryptographic protocols: tagging enforces termination (English)
0 references
6 April 2005
0 references
Cryptographic protocols
0 references
Horn clauses
0 references
Resolution
0 references
Termination
0 references
Tagging
0 references