scientific article; zbMATH DE number 1956510
From MaRDI portal
Publication:4417856
zbMath1029.94501MaRDI QIDQ4417856
Andreas Podelski, Bruno Blanchet
Publication date: 30 July 2003
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2620/26200136.htm
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (8)
A (restricted) quantifier elimination for security protocols ⋮ Deciding equivalence-based properties using constraint solving ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ Composition of password-based protocols ⋮ A method for symbolic analysis of security protocols ⋮ Safely Composing Security Protocols ⋮ Safely composing security protocols ⋮ Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
This page was built for publication: