Evaluation of anonymity and confidentiality protocols using theorem proving
From MaRDI portal
Publication:5962971
DOI10.1007/s10703-015-0232-5zbMath1331.68028OpenAlexW840673086MaRDI QIDQ5962971
Tarek Mhamdi, Osman Hasan, Sofiène Tahar
Publication date: 25 February 2016
Published in: Formal Methods in System Design (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10703-015-0232-5
Data encryption (aspects in computer science) (68P25) Information theory (general) (94A15) Network protocols (68M12)
Related Items
Uses Software
Cites Work
- A theory of type polymorphism in programming
- An introduction to mathematical logic and type theory: To truth through proof.
- Formalization of Entropy Measures in HOL
- Assessing security threats of looping constructs
- Anonymity Protocols as Noisy Channels
- On the Foundations of Quantitative Information Flow
- On the Formalization of the Lebesgue Integration Theory in HOL
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item