swMATH36025MaRDI QIDQ51727FDOQ51727
Author name not available (Why is that?)
Official website: https://dl.acm.org/doi/10.5555/882491.884227
Cited In (9)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries
- A Formal Language for Cryptographic Pseudocode
- A calculus for cryptographic protocols: The spi calculus
- An inductive approach to strand spaces
- OFMC
- The reactive simulatability (RSIM) framework for asynchronous systems
- Cryptographic protocol security analysis based on bounded constructing algorithm
- A collusion problem and its solution
- Unifying simulatability definitions in cryptographic systems under different timing assumptions
This page was built for software: Interrogator