Comparing State Spaces in Automatic Security Protocol Analysis
From MaRDI portal
Publication:3631370
DOI10.1007/978-3-642-02002-5_5zbMATH Open1242.94022OpenAlexW1499326294MaRDI QIDQ3631370FDOQ3631370
Authors: Pascal Lafourcade, Philippe Nadeau, C. J. F. Cremers
Publication date: 9 June 2009
Published in: Formal to Practical Security (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-02002-5_5
Recommendations
Cites Work
- Computer Aided Verification
- Title not available (Why is that?)
- Title not available (Why is that?)
- Using encryption for authentication in large networks of computers
- Applied finite group actions.
- A logic of authentication
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- The CL-Atse Protocol Analyser
- Security properties: two agents are sufficient
- Title not available (Why is that?)
- Title not available (Why is that?)
- Injective synchronisation: An extension of the authentication hierarchy
- An optimized intruder model for SAT-based model-checking of security protocols
- An Obvious Proof of Burnside's Lemma
Cited In (4)
Uses Software
This page was built for publication: Comparing State Spaces in Automatic Security Protocol Analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3631370)