Intruders with Caps
From MaRDI portal
Publication:5432331
DOI10.1007/978-3-540-73449-9_4zbMath1203.94091MaRDI QIDQ5432331
Paliath Narendran, Michaël Rusinowitch, Siva Anantharaman
Publication date: 2 January 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-73449-9_4
Related Items
Computing Knowledge in Security Protocols under Convergent Equational Theories, Automated Verification of Equivalence Properties of Cryptographic Protocols, Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Computing knowledge in security protocols under convergent equational theories, Unification modulo homomorphic encryption, Compiling and securing cryptographic protocols, Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols, Challenges in the Automated Verification of Security Protocols, YAPA: A Generic Tool for Computing Intruder Knowledge, Unification Modulo Homomorphic Encryption