scientific article; zbMATH DE number 1948406
From MaRDI portal
Publication:4411970
zbMath1015.68070MaRDI QIDQ4411970
Publication date: 13 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2477/24770342.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (11)
Deciding knowledge in security protocols under equational theories ⋮ Formal analysis and offline monitoring of electronic exams ⋮ Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA ⋮ Constraint Abstraction in Verification of Security Protocols ⋮ Implementing Spi Calculus Using Nominal Techniques ⋮ Automated verification of selected equivalences for security protocols ⋮ Modeling and Verifying Time Sensitive Security Protocols with Constraints ⋮ Breaking and fixing public-key Kerberos ⋮ A static analysis of cryptographic processes: the denotational approach ⋮ Verification of cryptographic protocols: tagging enforces termination ⋮ An Introduction to Security API Analysis
This page was built for publication: