Proof-based design of security protocols
From MaRDI portal
Publication:3569728
DOI10.1007/978-3-642-13182-0_3zbMATH Open1285.68044OpenAlexW1504821644MaRDI QIDQ3569728FDOQ3569728
Dominique Mery, Nazim Benaissa
Publication date: 22 June 2010
Published in: Computer Science โ Theory and Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-13182-0_3
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Network protocols (68M12)
Cited In (4)
Recommendations
- Cryptographic Protocols Analysis in Event B ๐ ๐
- Compositional refinement in agent-based security protocols ๐ ๐
- Modelling Attackerโs Knowledge for Cascade Cryptographic Protocols ๐ ๐
- Action Refinement in Process Algebra and Security Issues ๐ ๐
- Sound Security Protocol Transformations ๐ ๐
This page was built for publication: Proof-based design of security protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569728)