The following pages link to (Q4536407):
Displaying 10 items.
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946) (← links)
- Multi-attacker protocol validation (Q540676) (← links)
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- A computational interpretation of Dolev-Yao adversaries (Q557888) (← links)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- Intruder deduction for the equational theory of abelian groups with distributive encryption (Q876047) (← links)
- Computationally sound implementations of equational theories against passive adversaries (Q1013091) (← links)
- Safely composing security protocols (Q1028731) (← links)
- Ergodic Mean-Payoff Games for the Analysis of Attacks in Crypto-Currencies (Q5009424) (← links)