Using probabilistic automata for security protocols verification
From MaRDI portal
Publication:2201275
Recommendations
Cites work
Cited in
(7)- Challenges in the Automated Verification of Security Protocols
- AI 2005: Advances in Artificial Intelligence
- Foundations of Software Science and Computation Structures
- Using probabilistic Kleene algebra pKA for protocol verification
- Formal analysis and parallelism in protocols
- Modeling adversaries in a logic for security protocol analysis
- Automated identification of desynchronisation attacks on shared secrets
This page was built for publication: Using probabilistic automata for security protocols verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2201275)