Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (Q2643568): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(6 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.jsc.2004.04.002 / rank
Normal rank
 
Property / describes a project that uses
 
Property / describes a project that uses: TAPS / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: Casper / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: NRL / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jsc.2004.04.002 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2036707990 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic analysis of programs with well quasi-ordered domains. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536615 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Logic Programming with Focusing Proofs in Linear Logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3357521 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory and Applications of Satisfiability Testing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4535055 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An effective fixpoint semantics for linear logic programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: A logic of authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: Typed Multiset Rewriting Specifications of Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4804905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2754128 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2763635 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2703711 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear concurrent constraint programming: Operational and phase semantics / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2723425 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Linear logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2767013 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Asynchronous communication model based on linear logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encoding transition systems in sequent calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: The NRL Protocol Analyzer: An Overview / rank
 
Normal rank
Property / cites work
 
Property / cites work: Forum: A multiple-conclusion specification logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Uniform proofs as a foundation for logic programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.JSC.2004.04.002 / rank
 
Normal rank

Latest revision as of 12:37, 19 December 2024

scientific article
Language Label Description Also known as
English
Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
scientific article

    Statements

    Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (English)
    0 references
    0 references
    0 references
    24 August 2007
    0 references
    linear logic
    0 references
    bottom-up evaluation
    0 references
    model checking
    0 references
    authentication protocols
    0 references
    0 references
    0 references
    0 references

    Identifiers