Analysis of security protocols based on challenge-response
From MaRDI portal
Publication:2372525
DOI10.1007/S11432-007-0015-8zbMATH Open1121.68045OpenAlexW2043474443MaRDI QIDQ2372525FDOQ2372525
Authors: Yanyan Li
Publication date: 30 July 2007
Published in: Science in China. Series F (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s11432-007-0015-8
Recommendations
- Analysis of security protocols as open systems
- Analysis of security protocols based on authentication test
- Security analysis of the modular enhanced symmetric role authentication (mERA) protocol
- scientific article; zbMATH DE number 1927581
- Analyzing security protocols with secrecy types and logic programs
Cites Work
Cited In (2)
This page was built for publication: Analysis of security protocols based on challenge-response
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2372525)