Type-based automated verification of authenticity in asymmetric cryptographic protocols
DOI10.1007/978-3-642-24372-1_7zbMATH Open1348.68129OpenAlexW1598545417MaRDI QIDQ3172905FDOQ3172905
Authors: Morten Dahl, Naoki Kobayashi, Yunde Sun, Hans Hüttel
Publication date: 7 October 2011
Published in: Automated Technology for Verification and Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-24372-1_7
Recommendations
Cryptography (94A60) Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12)
Cited In (6)
- Title not available (Why is that?)
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Automated Verification of Dynamic Root of Trust Protocols
- Type-Based Automated Verification of Authenticity in Cryptographic Protocols
- Title not available (Why is that?)
- Automated type-based analysis of injective agreement in the presence of compromised principals
This page was built for publication: Type-based automated verification of authenticity in asymmetric cryptographic protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3172905)