Pages that link to "Item:Q557888"
From MaRDI portal
The following pages link to A computational interpretation of Dolev-Yao adversaries (Q557888):
Displaying 12 items.
- Bounded memory Dolev-Yao adversaries in collaborative systems (Q462499) (← links)
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Weakening the perfect encryption assumption in Dolev-Yao adversaries (Q557896) (← links)
- The lazy adversary conjecture fails (Q706320) (← links)
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings (Q1761600) (← links)
- Universally composable symbolic security analysis (Q2429708) (← links)
- Sound and complete computational interpretation of symbolic hashes in the standard model (Q2481980) (← links)
- Modeling adversaries in a logic for security protocol analysis (Q2881088) (← links)
- Computationally Sound Formalization of Rerandomizable RCCA Secure Encryption (Q3631375) (← links)
- All Classical Adversary Methods Are Equivalent for Total Functions (Q5061885) (← links)
- Programming Languages and Systems (Q5316563) (← links)
- Global Computing (Q5464840) (← links)