Trustworthy Global Computing
From MaRDI portal
Publication:5394799
DOI10.1007/11580850zbMath1151.68404OpenAlexW2972035647MaRDI QIDQ5394799
Joshua D. Guttman, Jonathan Herzog, Brian T. Sniffen, John D. Ramsdell
Publication date: 1 November 2006
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11580850
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Theory of software (68N99)
Related Items (5)
Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA ⋮ Universally composable symbolic security analysis ⋮ State and progress in strand spaces: proving fair exchange ⋮ Safe abstractions of data encodings in formal security protocol models ⋮ Cryptographic Protocol Composition via the Authentication Tests
This page was built for publication: Trustworthy Global Computing