Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol
From MaRDI portal
Publication:3178248
DOI10.1016/j.entcs.2010.08.007zbMath1343.94077OpenAlexW1985229708MaRDI QIDQ3178248
Dusko Pavlovic, Catherine A. Meadows
Publication date: 8 July 2016
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2010.08.007
Related Items (1)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A survey of symbolic methods in computational analysis of cryptographic systems
- Modeling concurrency with partial orders
- Reconciling two views of cryptography (The computational soundness of formal encryption)
- Protocol Composition Logic (PCL)
- Guarded Transitions in Evolving Specifications
- Let’s Get Physical: Models and Methods for Real-World Security Protocols
- On the security of public key protocols
- Foundations of Cryptography
- Fast Software Encryption
- Automata, Languages and Programming
- Theory of Cryptography
This page was built for publication: Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol