Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Proof-based design of security protocols

From MaRDI portal
Publication:3569728
Jump to:navigation, search

DOI10.1007/978-3-642-13182-0_3zbMATH Open1285.68044OpenAlexW1504821644MaRDI QIDQ3569728FDOQ3569728

Dominique Mery, Nazim Benaissa

Publication date: 22 June 2010

Published in: Computer Science โ€“ Theory and Applications (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13182-0_3




Mathematics Subject Classification ID

Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Network protocols (68M12)



Cited In (4)

  • Proof techniques for cryptographic processes
  • Programming Languages and Systems
  • Title not available (Why is that?)
  • Limits of Constructive Security Proofs


   Recommendations
  • Cryptographic Protocols Analysis in Event B ๐Ÿ‘ ๐Ÿ‘Ž
  • Compositional refinement in agent-based security protocols ๐Ÿ‘ ๐Ÿ‘Ž
  • Modelling Attackerโ€™s Knowledge for Cascade Cryptographic Protocols ๐Ÿ‘ ๐Ÿ‘Ž
  • Action Refinement in Process Algebra and Security Issues ๐Ÿ‘ ๐Ÿ‘Ž
  • Sound Security Protocol Transformations ๐Ÿ‘ ๐Ÿ‘Ž





This page was built for publication: Proof-based design of security protocols

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569728)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3569728&oldid=16968401"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 5 February 2024, at 02:17. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki