Abstract Interpretation for Proving Secrecy Properties in Security Protocols
From MaRDI portal
Publication:2841216
DOI10.1016/S1571-0661(04)00243-9zbMath1268.94023OpenAlexW2067797538WikidataQ115012793 ScholiaQ115012793MaRDI QIDQ2841216
Publication date: 24 July 2013
Published in: Electronic Notes in Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/s1571-0661(04)00243-9
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- An attack on the Needham-Schroeder public-key authentication protocol
- Applying a formal analysis technique to the CCITT X.509 strong two-way authentication protocol
- Designing secure key exchange protocols
- A calculus of mobile processes. II
- A calculus for cryptographic protocols: The spi calculus
- A logic of authentication
- A semantics for a logic of authentication (extended abstract)
This page was built for publication: Abstract Interpretation for Proving Secrecy Properties in Security Protocols