scientific article; zbMATH DE number 1927581
From MaRDI portal
Publication:4484506
zbMath1012.68520MaRDI QIDQ4484506
Maria Grazia Buscemi, Michele Boreale
Publication date: 12 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2421/24210483.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Authentication, digital signatures and secret sharing (94A62)
Related Items (6)
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ On the semantics of Alice \& Bob specifications of security protocols ⋮ Efficient representation of the attacker's knowledge in cryptographic protocols analysis ⋮ Verification of cryptographic protocols: tagging enforces termination ⋮ A method for symbolic analysis of security protocols ⋮ Linearity, Persistence and Testing Semantics in the Asynchronous Pi-Calculus
This page was built for publication: