Modeling and Verifying Time Sensitive Security Protocols with Constraints
From MaRDI portal
Publication:5415612
DOI10.1016/j.entcs.2008.04.056zbMath1286.68324OpenAlexW2093623620MaRDI QIDQ5415612
Mengjun Li, Zhou-Jun Li, Ti Zhou, Huowang Chen
Publication date: 13 May 2014
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.entcs.2008.04.056
Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12)
Uses Software
Cites Work
- On the security of public key protocols
- Using encryption for authentication in large networks of computers
- Analyzing security protocols with secrecy types and logic programs
- Tools and Algorithms for the Construction and Analysis of Systems
- CONCUR 2004 - Concurrency Theory
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: Modeling and Verifying Time Sensitive Security Protocols with Constraints