Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Security properties: two agents are sufficient

From MaRDI portal
Publication:1887730
Jump to:navigation, search

DOI10.1016/j.scico.2003.12.002zbMath1073.68028OpenAlexW1836114257WikidataQ115037039 ScholiaQ115037039MaRDI QIDQ1887730

Véronique Cortier, Hubert Comon-Lundh

Publication date: 22 November 2004

Published in: Science of Computer Programming (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1016/j.scico.2003.12.002

zbMATH Keywords

Horn clausesAuthenticationSecrecyCryptographic protocolsAgent identities


Mathematics Subject Classification ID

Data encryption (aspects in computer science) (68P25)


Related Items

Challenges in the Automated Verification of Security Protocols, Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach, Rigid tree automata and applications, Safely Composing Security Protocols, Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables, Comparing State Spaces in Automatic Security Protocol Analysis, Safely composing security protocols, Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif



Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:1887730&oldid=14289569"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 1 February 2024, at 13:07.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki