On the Security of Ping-Pong Protocols
From MaRDI portal
Publication:3661462
Recommendations
Cited in
(11)- A method for symbolic analysis of security protocols
- On the security of ping-pong protocols
- Revisiting the security of secure direct communication based on ping-pong protocol
- scientific article; zbMATH DE number 2036574 (Why is no real title available?)
- AN INTELLIGENT SECURITY AGENT FOR A RELIABLE CIPHER SYSTEM USING PINGPONG
- A sufflcient condition for secure ping-pong protocols
- Decidability issues for extended ping-pong protocols
- scientific article; zbMATH DE number 3920370 (Why is no real title available?)
- A general scheme for information interception in the ping-pong protocol
- Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
- scientific article; zbMATH DE number 3963720 (Why is no real title available?)
This page was built for publication: On the Security of Ping-Pong Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3661462)