Searching for Shapes in Cryptographic Protocols
From MaRDI portal
Publication:5758128
DOI10.1007/978-3-540-71209-1_41zbMath1186.94435OpenAlexW2110712507MaRDI QIDQ5758128
No author found.
Publication date: 3 September 2007
Published in: Tools and Algorithms for the Construction and Analysis of Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71209-1_41
Related Items
Exploring Theories with a Model-Finding Assistant, Security protocols as choreographies, Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later, State and progress in strand spaces: proving fair exchange, Breaking and fixing public-key Kerberos, Adding Branching to the Strand Space Model, CompoSAT: specification-guided coverage for model finding, Cryptographic Protocol Composition via the Authentication Tests, Event Structures with Symmetry, Skeletons, Homomorphisms, and Shapes: Characterizing Protocol Executions
Uses Software