Search results
From MaRDI portal
- Publication Date of Publication Type Vulnerability aware graphs for RFID protocol security benchmarking 2015-05-22 Paper...10 bytes (16 words) - 09:57, 25 September 2023
- Paper Cross-tool semantics for protocol security goals 2018-10-26 Paper...10 bytes (18 words) - 20:53, 24 September 2023
- Assumption-based analysis of distance-bounding protocols with \textsc{cpsa} 2021-07-08 Paper Cross-tool semantics for protocol security goals 2018-10-26 Paper Trustworthy...10 bytes (18 words) - 20:53, 24 September 2023
- Paper Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions 2009-06-30 Paper Models and Proofs of Protocol Security:...10 bytes (18 words) - 04:11, 25 September 2023
- Publication Date of Publication Type Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA 2023-06-28 Paper Assumption-based...10 bytes (18 words) - 06:00, 7 October 2023
- 2009-08-11 Paper Models and Proofs of Protocol Security: A Progress Report 2009-06-30 Paper Analyzing security protocols with secrecy types and logic programs...10 bytes (16 words) - 21:36, 22 September 2023
- quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...10 bytes (16 words) - 23:08, 27 December 2023
- quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...10 bytes (18 words) - 23:08, 27 December 2023
- quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...10 bytes (16 words) - 23:08, 27 December 2023
- quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...10 bytes (16 words) - 13:23, 7 October 2023
- possible 2013-09-20 Paper Security analysis of quantum multi-signature protocol based on teleportation 2013-07-26 Paper A quantum protocol for millionaire problem...10 bytes (17 words) - 00:33, 10 December 2023
- the NAXOS protocol 2011-04-05 Paper Operational semantics and verification of security protocols. 2010-12-08 Paper Degrees of Security: Protocol Guarantees...10 bytes (21 words) - 03:58, 12 December 2023
- Paper Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol 2016-07-08 Paper Symbolic Protocol Analysis with Disequality Constraints Modulo...10 bytes (19 words) - 02:26, 12 December 2023
- identification protocols 2018-02-23 Paper Compact structure-preserving signatures with almost tight security 2017-11-15 Paper Optimal Security Proofs for Signatures...10 bytes (17 words) - 19:28, 11 December 2023
- Decoy-state quantum private query protocol with two-way communication 2024-01-19 Paper Memory-free quantum secret sharing protocol with collective detection 2023-06-01...10 bytes (17 words) - 22:08, 10 December 2023
- Signal-flow-based analysis of wireless security protocols 2013-12-03 Paper On the Security of the TLS Protocol: A Systematic Analysis 2013-09-02 Paper...10 bytes (18 words) - 18:26, 11 December 2023
- adaptive security and short ciphertexts 2012-10-25 Paper Provably secure one-round identity-based authenticated asymmetric group key agreement protocol 2012-07-13...10 bytes (17 words) - 22:04, 11 December 2023
- in symmetric and asymmetric trees 2021-09-23 Paper The security analysis of quantum B92 protocol in collective-rotation noise channel 2019-09-03 Paper Distributed...10 bytes (17 words) - 04:52, 12 December 2023
- Paper Specification and verification of the UCLA Unix security kernel 1980-01-01 Paper A locking protocol for resource coordination in distributed databases...10 bytes (18 words) - 10:26, 9 December 2023
- Encryption Without Random Oracles: Security Notions and Construction 2008-04-11 Paper Optimistic fair exchange e-commerce protocol based on secret sharing 2007-02-14...10 bytes (17 words) - 19:28, 11 December 2023