scientific article; zbMATH DE number 4191559
From MaRDI portal
Publication:3211248
zbMATH Open0722.94015MaRDI QIDQ3211248FDOQ3211248
Authors: Marie-Jeanne Toussaint, Pierre Wolper
Publication date: 1991
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Modal logic (including the logic of norms) (03B45) Specification and verification (program logics, model checking, etc.) (68Q60) Logic in computer science (03B70)
Cited In (11)
- Programming Languages and Systems
- A Testing Theory for a Higher-Order Cryptographic Language
- Title not available (Why is that?)
- Title not available (Why is that?)
- Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
- Title not available (Why is that?)
- Practical Formal Methods for Real World Cryptography (Invited Talk)
- LACPV'2001. Logical aspects of cryptographic protocol verification. Proceedings of the 1st workshop (a satellite workshop of CAV'01), Paris, France, July 23, 2001.
- Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols
- Title not available (Why is that?)
- Cryptographic Protocol Explication and End-Point Projection
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3211248)