Multi-attacker protocol validation
From MaRDI portal
Publication:540676
DOI10.1007/S10817-010-9185-YzbMATH Open1213.94077OpenAlexW2046147156MaRDI QIDQ540676FDOQ540676
Authors: Wihem Arsac, Giampaolo Bella, Xavier Chantry, Luca Compagna
Publication date: 3 June 2011
Published in: Journal of Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10817-010-9185-y
Recommendations
Cites Work
- Computer Aided Verification
- Title not available (Why is that?)
- A calculus for cryptographic protocols: The spi calculus
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- LTL model checking for security protocols
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Formal correctness of security protocols.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Metareasoning about security protocols using distributed temporal logic
- Validating Security Protocols under the General Attacker
- Title not available (Why is that?)
Cited In (1)
Uses Software
This page was built for publication: Multi-attacker protocol validation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q540676)