Security protocols and their properties
From MaRDI portal
Publication:2752046
Recommendations
Cited in
(19)- scientific article; zbMATH DE number 1504783 (Why is no real title available?)
- Cryptographic protocol logic: satisfaction for (timed) Dolev-Yao cryptography
- Information Security and Cryptology
- scientific article; zbMATH DE number 1947521 (Why is no real title available?)
- Pattern-matching spi-calculus
- On the secure implementation of security protocols
- Constructing Security Protocol Specifications for Web Services
- A formal semantics for protocol narrations
- scientific article; zbMATH DE number 2036024 (Why is no real title available?)
- A domain-specific language for cryptographic protocols based on streams
- Security Protocols: Principles and Calculi
- Secrecy types for asymmetric communication.
- A game-theoretic framework for specification and verification of cryptographic protocols
- Cryptographic logical relations
- scientific article; zbMATH DE number 1405886 (Why is no real title available?)
- scientific article; zbMATH DE number 7361813 (Why is no real title available?)
- Foundations of Security Analysis and Design II
- A chart semantics for the pi-calculus
- A brief history of security protocols
This page was built for publication: Security protocols and their properties
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2752046)