From One Session to Many: Dynamic Tags for Security Protocols
From MaRDI portal
Publication:5505548
Recommendations
Cited in
(11)- Bounded memory protocols
- A (restricted) quantifier elimination for security protocols
- Computer Science Logic
- Safely composing security protocols
- Sessions and separability in security protocols
- Bounded memory Dolev-Yao adversaries in collaborative systems
- Dynamic tags for security protocols
- Challenges in the Automated Verification of Security Protocols
- Modular verification of protocol equivalence in the presence of randomness
- Composition of password-based protocols
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
This page was built for publication: From One Session to Many: Dynamic Tags for Security Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5505548)