scientific article; zbMATH DE number 1927556
From MaRDI portal
Publication:4484480
zbMATH Open1012.68528MaRDI QIDQ4484480FDOQ4484480
Authors: Andrew D. Gordon
Publication date: 12 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2421/24210099.htm
Title of this publication is not available (Why is that?)
Recommendations
- scientific article; zbMATH DE number 1832233
- Type-based automated verification of authenticity in asymmetric cryptographic protocols
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Secrecy by typing in security protocols
- Type-Based Automated Verification of Authenticity in Cryptographic Protocols
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cited In (10)
- Type-based automated verification of authenticity in asymmetric cryptographic protocols
- Logical foundations of secure resource management in protocol implementations
- Title not available (Why is that?)
- Towards the correctness of security protocols
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Secrecy types for asymmetric communication.
- Foundations of Software Science and Computation Structures
- Typing messages for free in security protocols
- Title not available (Why is that?)
- Information and Communications Security
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484480)