Pages that link to "Item:Q672251"
From MaRDI portal
The following pages link to An attack on the Needham-Schroeder public-key authentication protocol (Q672251):
Displaying 35 items.
- SAT-solving in CSP trace refinement (Q436423) (← links)
- Automated type-based analysis of injective agreement in the presence of compromised principals (Q492914) (← links)
- Certificateless one-pass and two-party authenticated key agreement protocol and its extensions (Q508905) (← links)
- An NP decision procedure for protocol insecurity with XOR (Q557799) (← links)
- Simulation relations for alternating Büchi automata (Q557801) (← links)
- Intruder deduction for the equational theory of abelian groups with distributive encryption (Q876047) (← links)
- Formal modeling, performance estimation, and model checking of wireless sensor network algorithms in Real-Time Maude (Q1004068) (← links)
- Authentication tests and the structure of bundles. (Q1603655) (← links)
- An attack-finding algorithm for security protocols. (Q1850665) (← links)
- A new logic for electronic commerce protocols (Q1853749) (← links)
- An approach for formal verification of authentication protocols (Q2140957) (← links)
- A tutorial-style introduction to \(\mathsf{DY}^{\star}\) (Q2154012) (← links)
- Joshua Guttman: pioneering strand spaces (Q2154021) (← links)
- Universally composable symbolic security analysis (Q2429708) (← links)
- The meeting businessmen problem: requirements and limitations (Q2443007) (← links)
- Transducer-based analysis of cryptographic protocols (Q2464141) (← links)
- Cryptographic logical relations (Q2481976) (← links)
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (Q2484410) (← links)
- Verifying security protocols with PVS: widening the rank function approach (Q2484411) (← links)
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (Q2643568) (← links)
- Graphical Calculus for Quantum Key Distribution (Extended Abstract) (Q2825376) (← links)
- Abstract Interpretation for Proving Secrecy Properties in Security Protocols (Q2841216) (← links)
- (Q2851055) (← links)
- Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions (Q2866733) (← links)
- Validation of Decentralised Smart Contracts Through Game Theory and Formal Methods (Q3460868) (← links)
- Challenges in the Automated Verification of Security Protocols (Q3541719) (← links)
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol (Q3613472) (← links)
- Security in the Ajanta mobile agent system (Q4791087) (← links)
- (Q4993330) (← links)
- Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model (Q5195250) (← links)
- Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming (Q5325767) (← links)
- Theorem Proving Based on Proof Scores for Rewrite Theory Specifications of OTSs (Q5403086) (← links)
- Completeness and Herbrand theorems for nominal logic (Q5477637) (← links)
- A bisimulation for dynamic sealing (Q5899331) (← links)
- Attack on LAC Key Exchange in Misuse Situation (Q6488037) (← links)