scientific article; zbMATH DE number 1927583
From MaRDI portal
Publication:4484508
zbMATH Open1012.68523MaRDI QIDQ4484508FDOQ4484508
Authors: Ralf Küsters
Publication date: 12 June 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2421/24210515.htm
Title of this publication is not available (Why is that?)
Recommendations
Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Cited In (9)
- Programming Languages and Systems
- Title not available (Why is that?)
- Title not available (Why is that?)
- An NP decision procedure for protocol insecurity with XOR
- On the freedom of decryption
- Simulation relations for alternating Büchi automata
- Title not available (Why is that?)
- Transducer-based analysis of cryptographic protocols
- Verifying Cryptographic Protocols with Subterms Constraints
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4484508)