Mathematical Research Data Initiative
Main page
Recent changes
Random page
SPARQL
MaRDI@GitHub
New item
Special pages
In other projects
MaRDI portal item
Discussion
View source
View history
English
Log in

Proof-based design of security protocols

From MaRDI portal
Publication:3569728
Jump to:navigation, search

DOI10.1007/978-3-642-13182-0_3zbMATH Open1285.68044OpenAlexW1504821644MaRDI QIDQ3569728FDOQ3569728


Authors: Nazim Benaissa, Dominique Mery Edit this on Wikidata


Publication date: 22 June 2010

Published in: Computer Science – Theory and Applications (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-13182-0_3




Recommendations

  • Cryptographic Protocols Analysis in Event B
  • Compositional refinement in agent-based security protocols
  • Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols
  • Action Refinement in Process Algebra and Security Issues
  • Sound Security Protocol Transformations


Mathematics Subject Classification ID

Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Network protocols (68M12)



Cited In (6)

  • Compositional refinement in agent-based security protocols
  • Modelling Attacker’s Knowledge for Cascade Cryptographic Protocols
  • Proof techniques for cryptographic processes
  • Programming Languages and Systems
  • Title not available (Why is that?)
  • Limits of Constructive Security Proofs





This page was built for publication: Proof-based design of security protocols

Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3569728)

Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:3569728&oldid=16968401"
Tools
What links here
Related changes
Printable version
Permanent link
Page information
This page was last edited on 5 February 2024, at 02:17. Warning: Page may not contain recent updates.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki