scientific article; zbMATH DE number 1948405
From MaRDI portal
Publication:4411969
zbMath1015.68068MaRDI QIDQ4411969
Publication date: 13 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2477/24770326.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ On the semantics of Alice \& Bob specifications of security protocols ⋮ Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming ⋮ Hierarchical combination of intruder theories ⋮ Verification of cryptographic protocols: tagging enforces termination ⋮ Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures ⋮ Comparing State Spaces in Automatic Security Protocol Analysis
Uses Software