Distributed temporal logic for the analysis of security protocol models (Q549724): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Secure implementation of channel abstractions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A framework for compositional verification of security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: The reactive simulatability (RSIM) framework for asynchronous systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Labelled Tableaux for Distributed Temporal Logic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542560 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocols for authentification and key establishment / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848036 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the semantics of Alice \& Bob specifications of security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4418589 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4798026 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4804905 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417886 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Safely composing security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4415247 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Specifying communication in distributed information systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Protocol Composition via the Authentication Tests / rank
 
Normal rank
Property / cites work
 
Property / cites work: Authentication tests and the structure of bundles. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2767013 / rank
 
Normal rank
Property / cites work
 
Property / cites work: TEMPORAL LOGICS FOR COMMUNICATING SEQUENTIAL AGENTS: I / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3785913 / rank
 
Normal rank
Property / cites work
 
Property / cites work: The NRL Protocol Analyzer: An Overview / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure Pseudonymous Channels / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol Composition Logic (PCL) / rank
 
Normal rank
Property / cites work
 
Property / cites work: A (restricted) quantifier elimination for security protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: The CL-Atse Protocol Analyser / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3030239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4857386 / rank
 
Normal rank

Revision as of 06:46, 4 July 2024

scientific article
Language Label Description Also known as
English
Distributed temporal logic for the analysis of security protocol models
scientific article

    Statements

    Distributed temporal logic for the analysis of security protocol models (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    18 July 2011
    0 references
    security protocols
    0 references
    security protocol analysis
    0 references
    security protocol models
    0 references
    temporal logic
    0 references
    distributed temporal logic
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references