Deciding security properties for cryptographic protocols. application to key cycles (Q2946596)
From MaRDI portal
| This is the item page for this Wikibase entity, intended for internal use and editing purposes. Please use this page instead for the normal view: Deciding security properties for cryptographic protocols. application to key cycles |
scientific article
| Language | Label | Description | Also known as |
|---|---|---|---|
| default for all languages | No label defined |
||
| English | Deciding security properties for cryptographic protocols. application to key cycles |
scientific article |
Statements
Deciding security properties for cryptographic protocols. application to key cycles (English)
0 references
17 September 2015
0 references
formal proofs
0 references
security protocols
0 references
symbolic constraints
0 references
verification
0 references
0.91826730966568
0 references
0.790962278842926
0 references
0.7781655192375183
0 references
0.7761086821556091
0 references