Mathematical Research Data Initiative
Main page
Recent changes
Random page
Help about MediaWiki
Create a new Item
Create a new Property
Create a new EntitySchema
Merge two items
In other projects
Discussion
View source
View history
Purge
English
Log in

Evaluation of anonymity and confidentiality protocols using theorem proving

From MaRDI portal
Publication:5962971
Jump to:navigation, search

DOI10.1007/s10703-015-0232-5zbMath1331.68028OpenAlexW840673086MaRDI QIDQ5962971

Tarek Mhamdi, Osman Hasan, Sofiène Tahar

Publication date: 25 February 2016

Published in: Formal Methods in System Design (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s10703-015-0232-5


zbMATH Keywords

theorem provingconfidentialityanonymitydependable systems and softwareinformation leakage


Mathematics Subject Classification ID

Data encryption (aspects in computer science) (68P25) Information theory (general) (94A15) Network protocols (68M12)


Related Items

Formalization of Normal Random Variables in HOL


Uses Software

  • ML
  • HOL
  • ETPS
  • GitHub


Cites Work

  • A theory of type polymorphism in programming
  • An introduction to mathematical logic and type theory: To truth through proof.
  • Formalization of Entropy Measures in HOL
  • Assessing security threats of looping constructs
  • Anonymity Protocols as Noisy Channels
  • On the Foundations of Quantitative Information Flow
  • On the Formalization of the Lebesgue Integration Theory in HOL
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
  • Unnamed Item
Retrieved from "https://portal.mardi4nfdi.de/w/index.php?title=Publication:5962971&oldid=12136229"
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information
MaRDI portal item
This page was last edited on 30 January 2024, at 02:29.
Privacy policy
About MaRDI portal
Disclaimers
Imprint
Powered by MediaWiki