Stop the war!
Остановите войну!
for scientists:
default search action
Formal Models and Techniques for Analyzing Security Protocols, 2011
- Véronique Cortier, Steve Kremer:
Formal Models and Techniques for Analyzing Security Protocols. Cryptology and Information Security Series 5, IOS Press 2011, ISBN 978-1-60750-713-0 - Véronique Cortier, Steve Kremer:
Introduction. 1-12 - Michaël Rusinowitch, Mathieu Turuani:
Verifying a bounded number of sessions and its complexity. 13-34 - Hubert Comon-Lundh, Stéphanie Delaune, Jonathan K. Millen:
Constraint solving techniques and enriching the model with equational theories. 35-61 - Gavin Lowe:
Analysing Security Protocols using CSP. 62-85 - Bruno Blanchet:
Using Horn Clauses for Analyzing Security Protocols. 86-111 - Mark Dermot Ryan, Ben Smyth:
Applied pi calculus. 112-142 - Riccardo Focardi, Matteo Maffei:
Types for Security Protocols. 143-181 - Anupam Datta, John C. Mitchell, Arnab Roy, Stephan Hyeonjun Stiller:
Protocol Composition Logic. 182-221 - Joshua D. Guttman:
Shapes: Surveying Crypto Protocol Runs. 222-257 - Steve A. Schneider:
Security Analysis using Rank Functions in CSP. 258-276 - Emmanuel Bresson, Yassine Lakhnech, Laurent Mazaré, Bogdan Warinschi:
Computational Soundness - The Case of Diffie-Hellman Keys. 277-302
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.