Using probabilistic automata for security protocols verification
From MaRDI portal
Publication:2201275
DOI10.17512/JAMCM.2016.2.13zbMATH Open1462.94060OpenAlexW2465002466MaRDI QIDQ2201275FDOQ2201275
Authors: Olga Siedlecka-Lamch, Mirosław Kurkowski, Jacek Piątkowski
Publication date: 28 September 2020
Published in: Journal of Applied Mathematics and Computational Mechanics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.17512/jamcm.2016.2.13
Recommendations
Cites Work
Cited In (7)
- Foundations of Software Science and Computation Structures
- Modeling adversaries in a logic for security protocol analysis
- Using probabilistic Kleene algebra pKA for protocol verification
- AI 2005: Advances in Artificial Intelligence
- Challenges in the Automated Verification of Security Protocols
- Formal analysis and parallelism in protocols
- Automated identification of desynchronisation attacks on shared secrets
This page was built for publication: Using probabilistic automata for security protocols verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2201275)