Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685): Difference between revisions

From MaRDI portal
Importer (talk | contribs)
Created a new Item
 
Normalize DOI.
 
(10 intermediate revisions by 10 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s10817-010-9188-8 / rank
Normal rank
 
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 94A60 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 68Q60 / rank
 
Normal rank
Property / Mathematics Subject Classification ID
 
Property / Mathematics Subject Classification ID: 68T15 / rank
 
Normal rank
Property / zbMATH DE Number
 
Property / zbMATH DE Number: 5903834 / rank
 
Normal rank
Property / zbMATH Keywords
 
security protocols
Property / zbMATH Keywords: security protocols / rank
 
Normal rank
Property / zbMATH Keywords
 
XOR
Property / zbMATH Keywords: XOR / rank
 
Normal rank
Property / zbMATH Keywords
 
automated verification
Property / zbMATH Keywords: automated verification / rank
 
Normal rank
Property / describes a project that uses
 
Property / describes a project that uses: ProVerif / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s10817-010-9188-8 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2053014980 / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q60530316 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated verification of selected equivalences for security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4797389 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An NP decision procedure for protocol insecurity with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automatic Analysis of the Security of XOR-Based Key Management Schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4447230 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security properties: two agents are sufficient / rank
 
Normal rank
Property / cites work
 
Property / cites work: Term Rewriting and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of PKCS #11 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Automatic Analysis of Recursive Security Protocols with XOR / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach / rank
 
Normal rank
Property / cites work
 
Property / cites work: Session Key Distribution Using Smart Cards / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Deduction – CADE-20 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case / rank
 
Normal rank
Property / cites work
 
Property / cites work: Automated Deduction – CADE-20 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S10817-010-9188-8 / rank
 
Normal rank
links / mardi / namelinks / mardi / name
 

Latest revision as of 20:57, 9 December 2024

scientific article
Language Label Description Also known as
English
Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach
scientific article

    Statements

    Identifiers