Secure protocol composition
From MaRDI portal
Recommendations
Cited in
(21)- Compositional refinement in agent-based security protocols
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Constraint-based structuring of network protocols
- Secure composition of protocols
- Cryptographic Protocol Composition via the Authentication Tests
- Protocol composition logic (PCL)
- A (restricted) quantifier elimination for security protocols
- Safely composing security protocols
- Transforming password protocols to compose
- Categorical composable cryptography
- scientific article; zbMATH DE number 1956551 (Why is no real title available?)
- Compositional analysis of contract-signing protocols
- scientific article; zbMATH DE number 5225572 (Why is no real title available?)
- Invariant-based reasoning about parameterized security protocols
- Sessions and separability in security protocols
- Deductive verification of alternating systems
- Sound Security Protocol Transformations
- Safely Composing Security Protocols
- A framework for compositional verification of security protocols
- Typing and compositionality for security protocols: a generalization to the geometric fragment
- Stateful protocol composition
This page was built for publication: Secure protocol composition
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q276488)