Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685): Difference between revisions
From MaRDI portal
Created a new Item |
Changed an Item |
||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 94A60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 68Q60 / rank | |||
Normal rank | |||
Property / Mathematics Subject Classification ID | |||
Property / Mathematics Subject Classification ID: 68T15 / rank | |||
Normal rank | |||
Property / zbMATH DE Number | |||
Property / zbMATH DE Number: 5903834 / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
security protocols | |||
Property / zbMATH Keywords: security protocols / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
XOR | |||
Property / zbMATH Keywords: XOR / rank | |||
Normal rank | |||
Property / zbMATH Keywords | |||
automated verification | |||
Property / zbMATH Keywords: automated verification / rank | |||
Normal rank |
Revision as of 10:09, 1 July 2023
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach |
scientific article |
Statements
Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (English)
0 references
3 June 2011
0 references
security protocols
0 references
XOR
0 references
automated verification
0 references