Pages that link to "Item:Q1330137"
From MaRDI portal
The following pages link to Three systems for cryptographic protocol analysis (Q1330137):
Displaying 34 items.
- On strengthening authentication protocols to foil cryptanalysis (Q826064) (← links)
- Deciding knowledge in security protocols under equational theories (Q860894) (← links)
- Formal correctness of security protocols. (Q869815) (← links)
- A domain-specific language for cryptographic protocols based on streams (Q1001891) (← links)
- On the freedom of decryption (Q1007641) (← links)
- Proof of soundness (integrity) of cryptographic protocols (Q1330133) (← links)
- A collusion problem and its solution (Q1383158) (← links)
- Primitives for authentication in process algebras. (Q1603653) (← links)
- Finite-state analysis of two contract signing protocols (Q1603658) (← links)
- Analysis of security protocols as open systems (Q1853583) (← links)
- A new logic for electronic commerce protocols (Q1853749) (← links)
- Secrecy types for asymmetric communication. (Q1874278) (← links)
- Joshua Guttman: pioneering strand spaces (Q2154021) (← links)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols (Q2368990) (← links)
- Formal analysis and offline monitoring of electronic exams (Q2402552) (← links)
- Breaking and fixing public-key Kerberos (Q2482453) (← links)
- Unifying simulatability definitions in cryptographic systems under different timing assumptions (Q2484407) (← links)
- Cryptographic protocol security analysis based on bounded constructing algorithm (Q2507460) (← links)
- The practice of cryptographic protocol verification (Q2841213) (← links)
- A quantitative study of two attacks (Q2849572) (← links)
- Performance evaluation of security protocols specified in LySa (Q2849853) (← links)
- Analysing the BKE-security protocol with \(\mu\)CRL (Q2851074) (← links)
- Demonstration of the modified CSN-logic (Q2909001) (← links)
- Alice and Bob Meet Equational Theories (Q2945705) (← links)
- Logic for verifying public-key cryptographic protocols (Q3125910) (← links)
- A Probabilistic Polynomial-time Calculus For Analysis of Cryptographic Protocols (Q4917062) (← links)
- Symmetric Authentication within a Simulatable Cryptographic Library (Q5030211) (← links)
- Relationship of Three Cryptographic Channels in the UC Framework (Q5505476) (← links)
- Verification, Model Checking, and Abstract Interpretation (Q5711502) (← links)
- A semantics for web services authentication (Q5892652) (← links)
- Information Security and Cryptology (Q5897824) (← links)
- Recent Trends in Algebraic Development Techniques (Q5900826) (← links)
- Verification, Model Checking, and Abstract Interpretation (Q5901900) (← links)
- Optimization of ProVerif Programs for AKE Protocols (Q6486106) (← links)