ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Belief Multiset Formalism for Cryptographic Protocol Analysis
Journal of Software
◽
10.3724/sp.j.1001.2009.03392
◽
2009
◽
Vol 20
(11)
◽
pp. 3060-3076
◽
Cited By ~ 4
Author(s):
Ling DONG
◽
Ke-Fei CHEN
◽
Xue-Jia LAI
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
Related Documents
Cited By
References
Extending Formal Cryptographic Protocol Analysis Techniques for Group Protocols and Low-Level Cryptographic Primitives
10.21236/ada464085
◽
2000
◽
Cited By ~ 13
Author(s):
Catherine Meadows
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Primitives
◽
Analysis Techniques
◽
Low Level
◽
Cryptographic Protocol Analysis
Download Full-text
Cryptographic protocol analysis using goal extraction
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004.
◽
10.1109/itcc.2004.1286429
◽
2004
◽
Author(s):
J. Edmonds
◽
M. Papa
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
Cryptographic Protocol Analysis of AN.ON
Financial Cryptography and Data Security - Lecture Notes in Computer Science
◽
10.1007/978-3-642-14577-3_11
◽
2010
◽
pp. 114-128
◽
Cited By ~ 5
Author(s):
Benedikt Westermann
◽
Rolf Wendolsky
◽
Lexi Pimenidis
◽
Dogan Kesdogan
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
Invited Address: Applying Formal Methods to Cryptographic Protocol Analysis
Computer Aided Verification - Lecture Notes in Computer Science
◽
10.1007/10722167_2
◽
2000
◽
pp. 2-2
Author(s):
Catherine Meadows
Keyword(s):
Formal Methods
◽
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
A Simple Language for Real-Time Cryptographic Protocol Analysis
Programming Languages and Systems - Lecture Notes in Computer Science
◽
10.1007/3-540-36575-3_9
◽
2003
◽
pp. 114-128
◽
Cited By ~ 19
Author(s):
Roberto Gorrieri
◽
Enrico Locatelli
◽
Fabio Martinelli
Keyword(s):
Real Time
◽
Protocol Analysis
◽
Cryptographic Protocol
◽
Simple Language
◽
Cryptographic Protocol Analysis
Download Full-text
Non-Malleability and Emulation Based Approach to Cryptographic Protocol Analysis
Chinese Journal of Computers
◽
10.3724/sp.j.1016.2009.00618
◽
2009
◽
Vol 32
(4)
◽
pp. 618-634
Author(s):
Yuan TIAN
◽
Ying WANG
◽
Feng JIN
◽
Yue JIN
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis
10.21236/ada463937
◽
2003
◽
Author(s):
Catherine Meadows
Keyword(s):
Protocol Analysis
◽
Requirements Specification
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
What Makes a Cryptographic Protocol Secure? The Evolution of Requirements Specification in Formal Cryptographic Protocol Analysis
Programming Languages and Systems - Lecture Notes in Computer Science
◽
10.1007/3-540-36575-3_2
◽
2003
◽
pp. 10-21
◽
Cited By ~ 7
Author(s):
Catherine Meadows
Keyword(s):
Protocol Analysis
◽
Requirements Specification
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
Download Full-text
Open issues in formal methods for cryptographic protocol analysis
Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00
◽
10.1109/discex.2000.824984
◽
2002
◽
Cited By ~ 1
Author(s):
C. Meadows
Keyword(s):
Formal Methods
◽
Protocol Analysis
◽
Cryptographic Protocol
◽
Cryptographic Protocol Analysis
◽
Open Issues
Download Full-text
Invariant generation techniques in cryptographic protocol analysis
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856934
◽
2002
◽
Cited By ~ 6
Author(s):
C. Meadows
Keyword(s):
Protocol Analysis
◽
Cryptographic Protocol
◽
Invariant Generation
◽
Cryptographic Protocol Analysis
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close