Protocol composition logic (PCL)
From MaRDI portal
Publication:2864155
Recommendations
Cites work
- scientific article; zbMATH DE number 1024060 (Why is no real title available?)
- scientific article; zbMATH DE number 1149905 (Why is no real title available?)
- scientific article; zbMATH DE number 1962757 (Why is no real title available?)
- scientific article; zbMATH DE number 1487486 (Why is no real title available?)
- scientific article; zbMATH DE number 1556014 (Why is no real title available?)
- A calculus for cryptographic protocols: The spi calculus
- An axiomatic basis for computer programming
- Automata, Languages and Programming
- Breaking and fixing public-key Kerberos
- Communicating sequential processes
- Compositional analysis of contract-signing protocols
- Computer Aided Verification
- Formal analysis of Kerberos 5
- Foundations of Software Science and Computation Structures
- Mobile values, new names, and secure communication
- On the Asynchronous Nature of the Asynchronous π-Calculus
- On the security of public key protocols
- Probabilistic logic
- Proofs of Networks of Processes
- Protocols for authentification and key establishment
- Secure protocol composition
- The NRL Protocol Analyzer: An Overview
- The chemical abstract machine
- Using encryption for authentication in large networks of computers
Cited in
(12)- Distributed temporal logic for the analysis of security protocol models
- Constructing Security Protocol Specifications for Web Services
- Categorical composable cryptography: extended version
- Categorical composable cryptography
- Compositional system security with interface-confined adversaries
- Bayesian authentication: quantifying security of the Hancke-Kuhn protocol
- CIL security proof for a password-based key exchange
- Safely Composing Security Protocols
- A framework for compositional verification of security protocols
- Study of protocol composition logic
- Computational Semantics for First-Order Logical Analysis of Cryptographic Protocols
- A survey of symbolic methods in computational analysis of cryptographic systems
This page was built for publication: Protocol composition logic (PCL)
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2864155)