Transducer-based analysis of cryptographic protocols (Q2464141): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Import241208061232 (talk | contribs)
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.ic.2007.08.003 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.ic.2007.08.003 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2005317419 / rank
 
Normal rank
Property / cites work
 
Property / cites work: XML with data values: Typechecking revisited. / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the symbolic reduction of processes with cryptographic functions. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535055 / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848035 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Three hierarchies of transducers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2723425 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484508 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Automatic Analysis of Recursive Security Protocols with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: STACS 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4494379 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4779173 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Haskell overloading is DEXPTIME-complete / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Deduction – CADE-20 / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONCUR 2005 – Concurrency Theory / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.IC.2007.08.003 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 19:08, 18 December 2024

scientific article
Language Label Description Also known as
English
Transducer-based analysis of cryptographic protocols
scientific article

    Statements

    Transducer-based analysis of cryptographic protocols (English)
    0 references
    0 references
    0 references
    10 December 2007
    0 references
    cryptographic protocols
    0 references
    automatic analysis
    0 references
    decidability
    0 references
    transducers
    0 references

    Identifiers