Pages that link to "Item:Q293167"
From MaRDI portal
The following pages link to An attack on a recursive authentication protocol. A cautionary tale (Q293167):
Displaying 9 items.
- An NP decision procedure for protocol insecurity with XOR (Q557799) (← links)
- Simulation relations for alternating Büchi automata (Q557801) (← links)
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (Q880981) (← links)
- A domain-specific language for cryptographic protocols based on streams (Q1001891) (← links)
- Combining proverif and automated theorem provers for security protocol verification (Q2305427) (← links)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols (Q2368990) (← links)
- Symbolic protocol analysis for monoidal equational theories (Q2482449) (← links)
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties (Q3184784) (← links)
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol (Q3540086) (← links)