Transducer-based analysis of cryptographic protocols (Q2464141): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(One intermediate revision by one other user not shown)
Property / DOI
 
Property / DOI: 10.1016/j.ic.2007.08.003 / rank
Normal rank
 
Property / cites work
 
Property / cites work: XML with data values: Typechecking revisited. / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the symbolic reduction of processes with cryptographic functions. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4234051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535055 / rank
 
Normal rank
Property / cites work
 
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848035 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535056 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Three hierarchies of transducers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2723425 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484508 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Automatic Analysis of Recursive Security Protocols with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: STACS 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4494379 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4779173 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Haskell overloading is DEXPTIME-complete / rank
 
Normal rank
Property / cites work
 
Property / cites work: Programming Languages and Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Deduction – CADE-20 / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONCUR 2005 – Concurrency Theory / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.IC.2007.08.003 / rank
 
Normal rank

Latest revision as of 19:08, 18 December 2024

scientific article
Language Label Description Also known as
English
Transducer-based analysis of cryptographic protocols
scientific article

    Statements

    Transducer-based analysis of cryptographic protocols (English)
    0 references
    0 references
    0 references
    10 December 2007
    0 references
    cryptographic protocols
    0 references
    automatic analysis
    0 references
    decidability
    0 references
    transducers
    0 references

    Identifiers