Deciding security properties for cryptographic protocols. application to key cycles
DOI10.1145/1656242.1656244zbMATH Open1351.94035arXiv0708.3564OpenAlexW2155993098WikidataQ130960630 ScholiaQ130960630MaRDI QIDQ2946596FDOQ2946596
Authors: Hubert Comon-Lundh, Véronique Cortier, Eugen Zălinescu
Publication date: 17 September 2015
Published in: ACM Transactions on Computational Logic (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/0708.3564
Recommendations
Cryptography (94A60) Computational difficulty of problems (lower bounds, completeness, difficulty of approximation, etc.) (68Q17) Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12)
Cited In (13)
- Deciding security for protocols with recursive tests
- A symbolic decision procedure for cryptographic protocols with time stamps
- Deducibility constraints and blind signatures
- Modeling and verifying ad hoc routing protocols
- A procedure for deciding symbolic equivalence between sets of constraint systems
- Title not available (Why is that?)
- Automating security analysis: symbolic equivalence of constraint systems
- Deciding Key Cycles for Security Protocols
- CONCUR 2004 - Concurrency Theory
- Deciding the security of protocols with commuting public key encryption
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables
- Intruder deducibility constraints with negation. Decidability and application to secured service compositions
- SPEC: an equivalence checker for security protocols
This page was built for publication: Deciding security properties for cryptographic protocols. application to key cycles
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2946596)