CONCUR 2005 – Concurrency Theory
From MaRDI portal
Publication:5897485
DOI10.1007/11539452zbMath1134.94368OpenAlexW1737342522MaRDI QIDQ5897485
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11539452
Related Items
Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later, Tree automata with equality constraints modulo equational theories, Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol, Proving Group Protocols Secure Against Eavesdroppers, Transducer-based analysis of cryptographic protocols, Deciding Security for Protocols with Recursive Tests