Information and Communications Security
From MaRDI portal
Publication:5464794
DOI10.1007/b101042zbMath1109.68475MaRDI QIDQ5464794
Christopher Lynch, Catherine A. Meadows
Publication date: 19 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b101042
94A60: Cryptography
68P25: Data encryption (aspects in computer science)
94A62: Authentication, digital signatures and secret sharing
Related Items
Satisfiability of general intruder constraints with and without a set constructor, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties