Validating Security Protocols under the General Attacker
From MaRDI portal
Publication:3184711
DOI10.1007/978-3-642-03459-6_3zbMath1252.68105OpenAlexW1562501381MaRDI QIDQ3184711
Xavier Chantry, Giampaolo Bella, Wihem Arsac, Luca Compagna
Publication date: 22 October 2009
Published in: Foundations and Applications of Security Analysis (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-03459-6_3
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Specification and verification (program logics, model checking, etc.) (68Q60) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
Uses Software
This page was built for publication: Validating Security Protocols under the General Attacker