scientific article; zbMATH DE number 1394315
From MaRDI portal
Publication:4934731
zbMath0951.94511MaRDI QIDQ4934731
Publication date: 1 February 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Model Checking Security Protocols ⋮ Optimal Proximity Proofs ⋮ Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol ⋮ Short paper: Terrorist fraud in distance bounding: getting around the models ⋮ Let’s Get Physical: Models and Methods for Real-World Security Protocols ⋮ Protocol analysis with time ⋮ Protocol analysis with time and space ⋮ Compact and Efficient UC Commitments Under Atomic-Exchanges ⋮ Two Decades of Maude ⋮ Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later ⋮ Towards Secure Distance Bounding ⋮ Authentication in Constrained Settings ⋮ An efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysis ⋮ Efficient Public-Key Distance Bounding Protocol ⋮ Quantum cryptography beyond quantum key distribution ⋮ Deterministic secure positioning in wireless sensor networks ⋮ Detecting relay attacks on RFID communication systems using quantum bits ⋮ Optimal Proximity Proofs Revisited ⋮ Hop chains: Secure routing and the establishment of distinct identities ⋮ A Symbolic Framework to Analyse Physical Proximity in Security Protocols