Search results

From MaRDI portal
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Publication Date of Publication Type Vulnerability aware graphs for RFID protocol security benchmarking 2015-05-22 Paper...
    10 bytes (16 words) - 09:57, 25 September 2023
  • Paper Cross-tool semantics for protocol security goals 2018-10-26 Paper...
    10 bytes (18 words) - 20:53, 24 September 2023
  • Assumption-based analysis of distance-bounding protocols with \textsc{cpsa} 2021-07-08 Paper Cross-tool semantics for protocol security goals 2018-10-26 Paper Trustworthy...
    10 bytes (18 words) - 20:53, 24 September 2023
  • Paper Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions 2009-06-30 Paper Models and Proofs of Protocol Security:...
    10 bytes (18 words) - 04:11, 25 September 2023
  • Publication Date of Publication Type Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA 2023-06-28 Paper Assumption-based...
    10 bytes (18 words) - 06:00, 7 October 2023
  • 2009-08-11 Paper Models and Proofs of Protocol Security: A Progress Report 2009-06-30 Paper Analyzing security protocols with secrecy types and logic programs...
    10 bytes (16 words) - 21:36, 22 September 2023
  • quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...
    10 bytes (16 words) - 23:08, 27 December 2023
  • quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...
    10 bytes (18 words) - 23:08, 27 December 2023
  • quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...
    10 bytes (16 words) - 23:08, 27 December 2023
  • quantum key distribution protocol for verification 2022-02-17 Paper An enhanced quantum key distribution protocol for security authentication 2022-02-17...
    10 bytes (16 words) - 13:23, 7 October 2023
  • possible 2013-09-20 Paper Security analysis of quantum multi-signature protocol based on teleportation 2013-07-26 Paper A quantum protocol for millionaire problem...
    10 bytes (17 words) - 00:33, 10 December 2023
  • the NAXOS protocol 2011-04-05 Paper Operational semantics and verification of security protocols. 2010-12-08 Paper Degrees of Security: Protocol Guarantees...
    10 bytes (21 words) - 03:58, 12 December 2023
  • Paper Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol 2016-07-08 Paper Symbolic Protocol Analysis with Disequality Constraints Modulo...
    10 bytes (19 words) - 02:26, 12 December 2023
  • identification protocols 2018-02-23 Paper Compact structure-preserving signatures with almost tight security 2017-11-15 Paper Optimal Security Proofs for Signatures...
    10 bytes (17 words) - 19:28, 11 December 2023
  • Decoy-state quantum private query protocol with two-way communication 2024-01-19 Paper Memory-free quantum secret sharing protocol with collective detection 2023-06-01...
    10 bytes (17 words) - 22:08, 10 December 2023
  • Signal-flow-based analysis of wireless security protocols 2013-12-03 Paper On the Security of the TLS Protocol: A Systematic Analysis 2013-09-02 Paper...
    10 bytes (18 words) - 18:26, 11 December 2023
  • adaptive security and short ciphertexts 2012-10-25 Paper Provably secure one-round identity-based authenticated asymmetric group key agreement protocol 2012-07-13...
    10 bytes (17 words) - 22:04, 11 December 2023
  • in symmetric and asymmetric trees 2021-09-23 Paper The security analysis of quantum B92 protocol in collective-rotation noise channel 2019-09-03 Paper Distributed...
    10 bytes (17 words) - 04:52, 12 December 2023
  • Paper Specification and verification of the UCLA Unix security kernel 1980-01-01 Paper A locking protocol for resource coordination in distributed databases...
    10 bytes (18 words) - 10:26, 9 December 2023
  • Encryption Without Random Oracles: Security Notions and Construction 2008-04-11 Paper Optimistic fair exchange e-commerce protocol based on secret sharing 2007-02-14...
    10 bytes (17 words) - 19:28, 11 December 2023
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)