Proof-based design of security protocols
From MaRDI portal
Publication:3569728
Recommendations
Cited in
(6)- Compositional refinement in agent-based security protocols
- Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols
- scientific article; zbMATH DE number 1330435 (Why is no real title available?)
- Limits of Constructive Security Proofs
- Programming Languages and Systems
- Proof techniques for cryptographic processes
This page was built for publication: Proof-based design of security protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569728)