scientific article; zbMATH DE number 1927582
From MaRDI portal
Publication:4484507
zbMATH Open1012.68522MaRDI QIDQ4484507FDOQ4484507
Witold Charatonik, Roberto M. Amadio
Publication date: 12 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2421/24210499.htm
Title of this publication is not available (Why is that?)
Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cited In (15)
- Deciding equivalence-based properties using constraint solving
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically
- Pattern-matching spi-calculus
- Safely composing security protocols
- An undecidability result for AGh
- Decidability issues for extended ping-pong protocols
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks
- On the symbolic reduction of processes with cryptographic functions.
- An NP decision procedure for protocol insecurity with XOR
- Simulation relations for alternating Büchi automata
- Safely Composing Security Protocols
- Formal modeling and analysis of fairness characterization of E-commerce protocols
- Rigid tree automata and applications
- Verification of cryptographic protocols: tagging enforces termination
- Comparing State Spaces in Automatic Security Protocol Analysis
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484507)