A comparison of three authentication properties.
From MaRDI portal
Publication:1853750
DOI10.1016/S0304-3975(02)00365-1zbMath1052.68033WikidataQ62045716 ScholiaQ62045716MaRDI QIDQ1853750
Roberto Gorrieri, Fabio Martinelli, Riccardo Focardi
Publication date: 22 January 2003
Published in: Theoretical Computer Science (Search for Journal in Brave)
68P25: Data encryption (aspects in computer science)
68Q85: Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.)
94A62: Authentication, digital signatures and secret sharing
Related Items
A semantics for web services authentication, Injective synchronisation: An extension of the authentication hierarchy, Analysis of security protocols as open systems, A Formalization of Credit and Responsibility Within the GNDC Schema
Cites Work
- A calculus for cryptographic protocols: The spi calculus
- Testing equivalences for processes
- Analysis of security protocols as open systems
- A logic of authentication
- Foundations of Security Analysis and Design II
- Reasoning about cryptographic protocols in the spi calculus
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item