The practice of cryptographic protocol verification
From MaRDI portal
Recommendations
Cited in
(11)- scientific article; zbMATH DE number 1696763 (Why is no real title available?)
- scientific article; zbMATH DE number 7297874 (Why is no real title available?)
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Shared verification cryptography domains: Security in computers
- Compiling and securing cryptographic protocols
- Verification, Model Checking, and Abstract Interpretation
- The coinductive approach to verifying cryptographic protocols.
- Automatic verification of temporal-epistemic properties of cryptographic protocols
- Proof techniques for cryptographic processes
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Verification of cryptographic protocols: tagging enforces termination
This page was built for publication: The practice of cryptographic protocol verification
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2841213)