Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (Q2484410): Difference between revisions
From MaRDI portal
Set profile property. |
Normalize DOI. |
||
(2 intermediate revisions by 2 users not shown) | |||
Property / DOI | |||
Property / DOI: 10.1016/j.jlap.2004.09.004 / rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1016/j.jlap.2004.09.004 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2034753880 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4484507 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2751353 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4535056 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4417886 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4447230 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Abstract interpretation and application to logic programs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New directions in cryptography / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: On the security of public key protocols / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3338216 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2751377 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2723425 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4411842 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Alternating two-way AC-tree automata / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Resolution Strategies as Decision Procedures / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4447232 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: An attack on the Needham-Schroeder public-key authentication protocol / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: The NRL Protocol Analyzer: An Overview / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4494379 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Using encryption for authentication in large networks of computers / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q5678447 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4539622 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2724150 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Haskell overloading is DEXPTIME-complete / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: A Unification Algorithm for Associative-Commutative Functions / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3408138 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4447233 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4539595 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q2751379 / rank | |||
Normal rank | |||
Property / DOI | |||
Property / DOI: 10.1016/J.JLAP.2004.09.004 / rank | |||
Normal rank |
Latest revision as of 22:45, 18 December 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically |
scientific article |
Statements
Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (English)
0 references
1 August 2005
0 references
Cryptographic protocols
0 references
Diffie-Hellman
0 references
Resolution
0 references
Clause
0 references
Associativity
0 references
Commutativity
0 references
Completeness
0 references
Abstraction
0 references
Abstract interpretation
0 references
Verification
0 references
Key exchange
0 references