Automated type-based analysis of injective agreement in the presence of compromised principals (Q492914): Difference between revisions

From MaRDI portal
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: TAMARIN / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.jlamp.2015.06.002 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1157586374 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secrecy by typing in security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONCUR 2005 – Concurrency Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modular verification of security protocol code by typing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Logical Foundations of Secure Resource Management in Protocol Implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pattern-matching spi-calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: A calculus for cryptographic protocols: The spi calculus / rank
 
Normal rank
Property / cites work
 
Property / cites work: Type-Based Automated Verification of Authenticity in Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Type Inference for Correspondence Types / rank
 
Normal rank
Property / cites work
 
Property / cites work: Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778806 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: A logic of authentication / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of SPLICE/AS -- The authentication system in WIDE Internet / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONCUR 2005 – Concurrency Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security Protocol Verification: Symbolic and Computational Models / rank
 
Normal rank
Property / cites work
 
Property / cites work: Isabelle. A generic theorem prover / rank
 
Normal rank
Property / cites work
 
Property / cites work: Formal correctness of security protocols. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Proving More Observational Equivalences with ProVerif / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verification of cryptographic protocols: tagging enforces termination / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure distributed programming with value-dependent types / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic relational verification for cryptographic implementations / rank
 
Normal rank
Property / cites work
 
Property / cites work: A bisimulation for dynamic sealing / rank
 
Normal rank

Latest revision as of 15:50, 10 July 2024

scientific article
Language Label Description Also known as
English
Automated type-based analysis of injective agreement in the presence of compromised principals
scientific article

    Statements

    Automated type-based analysis of injective agreement in the presence of compromised principals (English)
    0 references
    0 references
    0 references
    21 August 2015
    0 references
    authentication protocols
    0 references
    compromised principals
    0 references
    injective agreement
    0 references
    static analysis
    0 references
    type reconstruction
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers