Recommendations
Cites work
- scientific article; zbMATH DE number 1696763 (Why is no real title available?)
- scientific article; zbMATH DE number 1263181 (Why is no real title available?)
- scientific article; zbMATH DE number 1497865 (Why is no real title available?)
- scientific article; zbMATH DE number 1759457 (Why is no real title available?)
- A calculus for cryptographic protocols: The spi calculus
- Computer Aided Verification
- Formal correctness of security protocols.
- LTL model checking for security protocols
- Metareasoning about security protocols using distributed temporal logic
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- Validating Security Protocols under the General Attacker
This page was built for publication: Multi-attacker protocol validation
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q540676)