Safely Composing Security Protocols (Q5458848): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-540-77050-3_29 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W1681146363 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4484507 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417856 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418587 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security properties: two agents are sufficient / rank
 
Normal rank
Property / cites work
 
Property / cites work: Safely Composing Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deciding Key Cycles for Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol Composition Logic (PCL) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4387317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Logic for Programming, Artificial Intelligence, and Reasoning / rank
 
Normal rank

Latest revision as of 21:10, 27 June 2024

scientific article; zbMATH DE number 5267237
Language Label Description Also known as
English
Safely Composing Security Protocols
scientific article; zbMATH DE number 5267237

    Statements

    Identifiers