Combining Algorithms for Deciding Knowledge in Security Protocols
From MaRDI portal
Publication:3525004
DOI10.1007/978-3-540-74621-8_7zbMath1148.68361OpenAlexW1810931524MaRDI QIDQ3525004
Véronique Cortier, Mathilde Arnaud, Stéphanie Delaune
Publication date: 16 September 2008
Published in: Frontiers of Combining Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74621-8_7
Data encryption (aspects in computer science) (68P25) Decidability of theories and sets of sentences (03B25)
Related Items (8)
Deciding Knowledge in Security Protocols for Monoidal Equational Theories ⋮ Reducing equational theories for the decision of static equivalence ⋮ Computing knowledge in security protocols under convergent equational theories ⋮ Challenges in the Automated Verification of Security Protocols ⋮ Compiling and securing cryptographic protocols ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols ⋮ A Proof Theoretic Analysis of Intruder Theories ⋮ Deciding knowledge in security protocols under some e-voting theories
This page was built for publication: Combining Algorithms for Deciding Knowledge in Security Protocols