Pages that link to "Item:Q2507460"
From MaRDI portal
The following pages link to Cryptographic protocol security analysis based on bounded constructing algorithm (Q2507460):
Displaying 9 items.
- Algebra model and security analysis for cryptographic protocols (Q866077) (← links)
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis (Q931442) (← links)
- Automated analysis of security protocols (Q2844052) (← links)
- Alice and Bob Meet Equational Theories (Q2945705) (← links)
- Cryptographic Protocols Analysis in Event B (Q3402286) (← links)
- Automated Technology for Verification and Analysis (Q5394175) (← links)
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (Q6104494) (← links)
- An Optimizing Protocol Transformation for Constructor Finite Variant Theories in Maude-NPA (Q6485983) (← links)
- Optimization of ProVerif Programs for AKE Protocols (Q6486106) (← links)