Modeling and Verifying Time Sensitive Security Protocols with Constraints (Q5415612): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
Property / cites work
 
Property / cites work: Analyzing security protocols with secrecy types and logic programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4411970 / rank
 
Normal rank
Property / cites work
 
Property / cites work: CONCUR 2004 - Concurrency Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2747613 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tools and Algorithms for the Construction and Analysis of Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4417888 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5491199 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2852365 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Using encryption for authentication in large networks of computers / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3818127 / rank
 
Normal rank

Revision as of 11:57, 8 July 2024

scientific article; zbMATH DE number 6294813
Language Label Description Also known as
English
Modeling and Verifying Time Sensitive Security Protocols with Constraints
scientific article; zbMATH DE number 6294813

    Statements

    Modeling and Verifying Time Sensitive Security Protocols with Constraints (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    13 May 2014
    0 references
    time-sensitive security protocol
    0 references
    constraint
    0 references
    formal verification
    0 references

    Identifiers