scientific article
From MaRDI portal
Publication:2849571
zbMath1272.68053MaRDI QIDQ2849571
Ricardo Corin, Sandro Etalle, Jeroen Doumen
Publication date: 20 September 2013
Full work available at URL: http://www.sciencedirect.com/science/article/pii/S1571066105000241
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62)
Related Items (13)
Model Checking Security Protocols ⋮ Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks ⋮ Unnamed Item ⋮ Reducing equational theories for the decision of static equivalence ⋮ Computing knowledge in security protocols under convergent equational theories ⋮ Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete ⋮ Automated verification of selected equivalences for security protocols ⋮ Composition of password-based protocols ⋮ Automating Security Analysis: Symbolic Equivalence of Constraint Systems ⋮ Computing Knowledge in Security Protocols under Convergent Equational Theories ⋮ Computationally sound implementations of equational theories against passive adversaries ⋮ YAPA: A Generic Tool for Computing Intruder Knowledge ⋮ A Calculus to Detect Guessing Attacks
This page was built for publication: