Deciding security for protocols with recursive tests
From MaRDI portal
Publication:5200014
Recommendations
Cites work
- CONCUR 2005 – Concurrency Theory
- Computer Aided Verification
- Deciding knowledge in security protocols under equational theories
- Deciding security for protocols with recursive tests
- Deciding security properties for cryptographic protocols. application to key cycles
- On the Automatic Analysis of Recursive Security Protocols with XOR
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- STACS 2004
Cited in
(8)- STACS 2004
- On the Automatic Analysis of Recursive Security Protocols with XOR
- Message Confidentiality Testing of Security Protocols – Passive Monitoring and Active Checking
- Deciding security properties for cryptographic protocols. application to key cycles
- Secrecy for security protocols
- Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
- Transducer-based analysis of cryptographic protocols
- Deciding security for protocols with recursive tests
This page was built for publication: Deciding security for protocols with recursive tests
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5200014)