Operational semantics and verification of security protocols.
DOI10.1007/978-3-540-78636-8zbMath1267.68002OpenAlexW647742179MaRDI QIDQ610283
Publication date: 8 December 2010
Published in: Information Security and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-78636-8
Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Data encryption (aspects in computer science) (68P25) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Theory of data (68P99) Data structures (68P05) Network protocols (68M12)
Related Items (6)
Uses Software
This page was built for publication: Operational semantics and verification of security protocols.