Pages that link to "Item:Q3590969"
From MaRDI portal
The following pages link to On the Automatic Analysis of Recursive Security Protocols with XOR (Q3590969):
Displaying 6 items.
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685) (← links)
- Algorithmic problems in the symbolic approach to the verification of automatically synthesized cryptosystems (Q831949) (← links)
- Transducer-based analysis of cryptographic protocols (Q2464141) (← links)
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol (Q3540086) (← links)
- Proving Group Protocols Secure Against Eavesdroppers (Q3541693) (← links)
- Deciding Security for Protocols with Recursive Tests (Q5200014) (← links)