Secure protocol composition
From MaRDI portal
Publication:276488
DOI10.1016/S1571-0661(03)50011-1zbMath1337.68065OpenAlexW2990286289MaRDI QIDQ276488
Anupam Datta, John C. Mitchell, Dusko Pavlovic, Ante Derek
Publication date: 3 May 2016
Full work available at URL: https://doi.org/10.1016/s1571-0661(03)50011-1
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Mathematical aspects of software engineering (specification, verification, metrics, requirements, etc.) (68N30)
Related Items (6)
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ Compositional analysis of contract-signing protocols ⋮ A (restricted) quantifier elimination for security protocols ⋮ Categorical composable cryptography ⋮ Deductive verification of alternating systems ⋮ Protocol Composition Logic (PCL)
This page was built for publication: Secure protocol composition