Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

A quantitative study of two attacks

From MaRDI portal
Publication:2849572
Jump to:navigation, search

zbMATH Open1272.68049MaRDI QIDQ2849572FDOQ2849572


Authors: Chiara Bodei, Michele Curti, Pierpaolo Degano, Corrado Priami Edit this on Wikidata


Publication date: 20 September 2013


Full work available at URL: http://www.sciencedirect.com/science/article/pii/S1571066105000253




Recommendations

  • Performance evaluation of security protocols specified in LySa
  • Three systems for cryptographic protocol analysis
  • On quantitative analysis of probabilistic protocols
  • A survey of symbolic methods in computational analysis of cryptographic systems
  • Information leakage of non-terminating processes


Mathematics Subject Classification ID

Cryptography (94A60) Network protocols (68M12)



Cited In (6)

  • Measuring security in IoT communications
  • A Method for Estimation of the Success Probability of an Intrusion Process by Considering the Temporal Aspects of the Attacker Behavior
  • Performance evaluation of security protocols specified in LySa
  • Discovering, quantifying, and displaying attacks
  • There are two sides to every question. Controller versus attacker
  • Signal-flow-based analysis of wireless security protocols





This page was built for publication: A quantitative study of two attacks

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2849572)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:2849572&oldid=15778365"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 3 February 2024, at 19:22. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki