Pages that link to "Item:Q2946596"
From MaRDI portal
The following pages link to Deciding security properties for cryptographic protocols. application to key cycles (Q2946596):
Displaying 8 items.
- Modeling and verifying ad hoc routing protocols (Q462483) (← links)
- Deducibility constraints and blind signatures (Q462488) (← links)
- Intruder deducibility constraints with negation. Decidability and application to secured service compositions (Q507348) (← links)
- A procedure for deciding symbolic equivalence between sets of constraint systems (Q2013557) (← links)
- SPEC: An Equivalence Checker for Security Protocols (Q3179281) (← links)
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables (Q3631368) (← links)
- Deciding Security for Protocols with Recursive Tests (Q5200014) (← links)
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (Q5747780) (← links)