Injective synchronisation: An extension of the authentication hierarchy
From MaRDI portal
Publication:860905
DOI10.1016/j.tcs.2006.08.034zbMath1153.94453OpenAlexW2160964355WikidataQ114129189 ScholiaQ114129189MaRDI QIDQ860905
C. J. F. Cremers, Sjouke Mauw, E. P. de Vink
Publication date: 9 January 2007
Published in: Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: http://orbilu.uni.lu/handle/10993/25877
Related Items (4)
Unnamed Item ⋮ On the relationships between models in protocol verification ⋮ A framework for compositional verification of security protocols ⋮ Comparing State Spaces in Automatic Security Protocol Analysis
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Operational semantics and verification of security protocols.
- A calculus for cryptographic protocols: The spi calculus
- Authentication tests and the structure of bundles.
- A new logic for electronic commerce protocols
- A comparison of three authentication properties.
- Using encryption for authentication in large networks of computers
- Computer Aided Verification
This page was built for publication: Injective synchronisation: An extension of the authentication hierarchy