scientific article; zbMATH DE number 4053510
From MaRDI portal
Publication:3789477
Recommendations
Cited in
(7)- Deciding the security of protocols with commuting public key encryption
- Satisfiability of Dolev-Yao constraints
- Secrecy for security protocols
- Intractable problems in cryptography
- Combining Algorithms for Deciding Knowledge in Security Protocols
- CONCUR 2004 - Concurrency Theory
- Deciding cryptographic protocol adequacy with HOL: the implementation
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3789477)