On the secure implementation of security protocols
DOI10.1016/J.SCICO.2004.01.002zbMATH Open1091.68047OpenAlexW1996107803WikidataQ115037035 ScholiaQ115037035MaRDI QIDQ1887732
Publication date: 22 November 2004
Published in: Science of Computer Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.scico.2004.01.002
Information flowAdmissibilityConfidentialityProtocol implementationSecurity policySemantics-based security
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
This page was built for publication: On the secure implementation of security protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1887732)