Let’s Get Physical: Models and Methods for Real-World Security Protocols
From MaRDI portal
Publication:3183515
DOI10.1007/978-3-642-03359-9_1zbMath1252.68040OpenAlexW1527974336MaRDI QIDQ3183515
Srdjan Capkun, Patrick Schaller, Benedikt Schmidt, David A. Basin
Publication date: 20 October 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03359-9_1
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (4)
Model Checking Security Protocols ⋮ Bayesian Authentication: Quantifying Security of the Hancke-Kuhn Protocol ⋮ Let’s Get Physical: Models and Methods for Real-World Security Protocols ⋮ Protocol analysis with time and space
Uses Software
Cites Work
- Structuring metatheory on inductive definitions
- Let’s Get Physical: Models and Methods for Real-World Security Protocols
- Defining functions on equivalence classes
- Tools and Algorithms for the Construction and Analysis of Systems
- Interpretation of Locales in Isabelle: Theories and Proof Contexts
- Unnamed Item
- Unnamed Item
This page was built for publication: Let’s Get Physical: Models and Methods for Real-World Security Protocols