A comparison of three authentication properties.
From MaRDI portal
Publication:1853750
DOI10.1016/S0304-3975(02)00365-1zbMath1052.68033WikidataQ62045716 ScholiaQ62045716MaRDI QIDQ1853750
Roberto Gorrieri, Fabio Martinelli, Riccardo Focardi
Publication date: 22 January 2003
Published in: Theoretical Computer Science (Search for Journal in Brave)
Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Authentication, digital signatures and secret sharing (94A62)
Related Items (4)
Injective synchronisation: An extension of the authentication hierarchy ⋮ A semantics for web services authentication ⋮ A Formalization of Credit and Responsibility Within the GNDC Schema ⋮ Analysis of security protocols as open systems
Cites Work
- A calculus for cryptographic protocols: The spi calculus
- Testing equivalences for processes
- Analysis of security protocols as open systems
- A logic of authentication
- Foundations of Security Analysis and Design II
- Reasoning about cryptographic protocols in the spi calculus
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: A comparison of three authentication properties.