scientific article; zbMATH DE number 1759624

From MaRDI portal
Publication:4536615

zbMath0999.94538MaRDI QIDQ4536615

Roberto M. Amadio, Denis Lugiez

Publication date: 28 November 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (24)

Protocol insecurity with a finite number of sessions and composed keys is NP-complete.Probabilistic and nondeterministic aspects of anonymityThe Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsDecidability issues for extended ping-pong protocolsDecision procedures for the security of protocols with probabilistic encryption against offline dictionary attacksSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsState space reduction in the Maude-NRL protocol analyzerBounded memory Dolev-Yao adversaries in collaborative systemsComputing knowledge in equational extensions of subterm convergent theoriesProtocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-completeEfficient representation of the attacker's knowledge in cryptographic protocols analysisSatisfiability of general intruder constraints with and without a set constructorUnnamed ItemA static analysis of cryptographic processes: the denotational approachTree automata with one memory set constraints and cryptographic protocolsAn NP decision procedure for protocol insecurity with XORSimulation relations for alternating Büchi automataA method for symbolic analysis of security protocolsA Proof Theoretic Analysis of Intruder TheoriesA symbolic decision procedure for cryptographic protocols with time stampsBounded memory protocolsAnalysis of security protocols as open systemsOn the symbolic reduction of processes with cryptographic functions.




This page was built for publication: