Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol (Q3178248): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Reconciling two views of cryptography (The computational soundness of formal encryption) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4279572 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4934731 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol Composition Logic (PCL) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automata, Languages and Programming / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5572358 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Guarded Transitions in Evolving Specifications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling concurrency with partial orders / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Software Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Let’s Get Physical: Models and Methods for Real-World Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: A survey of symbolic methods in computational analysis of cryptographic systems / rank
 
Normal rank

Latest revision as of 06:46, 12 July 2024

scientific article
Language Label Description Also known as
English
Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
scientific article

    Statements

    Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol (English)
    0 references
    0 references
    0 references
    8 July 2016
    0 references
    security protocol
    0 references
    pervasive authentication
    0 references
    symbolic model
    0 references
    Bayesian reasoning
    0 references
    distance bounding
    0 references

    Identifiers