ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
To infinity and beyond or, avoiding the infinite in security protocol analysis
Proceedings of the 2006 ACM symposium on Applied computing - SAC '06
◽
10.1145/1141277.1141359
◽
2006
◽
Author(s):
James Heather
◽
Steve Schneider
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Related Documents
Cited By
References
Bluetooth Security Protocol Analysis and Improvements
10.31979/etd.sc5w-6wj8
◽
2006
◽
Author(s):
Chi Shing Lee
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Probabilistic Polynomial-Time Process Calculus and Security Protocol Analysis
Programming Languages and Systems - Lecture Notes in Computer Science
◽
10.1007/3-540-45309-1_2
◽
2001
◽
pp. 23-29
◽
Cited By ~ 2
Author(s):
John C. Mitchell
Keyword(s):
Polynomial Time
◽
Protocol Analysis
◽
Security Protocol
◽
Process Calculus
◽
Time Process
◽
Probabilistic Polynomial Time
Download Full-text
The CASPA Tool: Causality-Based Abstraction for Security Protocol Analysis
Computer Aided Verification - Lecture Notes in Computer Science
◽
10.1007/978-3-540-70545-1_39
◽
2008
◽
pp. 419-422
◽
Cited By ~ 2
Author(s):
Michael Backes
◽
Stefan Lorenz
◽
Matteo Maffei
◽
Kim Pecina
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Maude versus Haskell: an Experimental Comparison in Security Protocol Analysis
Electronic Notes in Theoretical Computer Science
◽
10.1016/s1571-0661(05)80141-0
◽
2000
◽
Vol 36
◽
pp. 235-256
◽
Cited By ~ 7
Author(s):
David Basin
◽
Grit Denker
Keyword(s):
Protocol Analysis
◽
Security Protocol
◽
Experimental Comparison
Download Full-text
Application of Dependency Graphs to Security Protocol Analysis
Trustworthy Global Computing - Lecture Notes in Computer Science
◽
10.1007/978-3-540-78663-4_20
◽
2008
◽
pp. 294-311
◽
Cited By ~ 6
Author(s):
Ilja Tšahhirov
◽
Peeter Laud
Keyword(s):
Protocol Analysis
◽
Security Protocol
◽
Dependency Graphs
Download Full-text
Overview of Security Protocol Analysis
Secure Transaction Protocol Analysis - Lecture Notes in Computer Science
◽
10.1007/978-3-540-85074-8_2
◽
2008
◽
pp. 17-72
◽
Cited By ~ 2
Author(s):
Qingfeng Chen
◽
Chengqi Zhang
◽
Shichao Zhang
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
Logic Journal of IGPL
◽
10.1093/jigpal/jzi048
◽
2005
◽
Vol 13
(6)
◽
pp. 637-663
◽
Cited By ~ 12
Author(s):
Carlos Caleiro
◽
Luca Viganò
◽
David Basin
Keyword(s):
Temporal Logic
◽
Protocol Analysis
◽
Security Protocol
◽
Strand Spaces
Download Full-text
Relating strands and multiset rewriting for security protocol analysis
Proceedings 13th IEEE Computer Security Foundations Workshop. CSFW-13
◽
10.1109/csfw.2000.856924
◽
2002
◽
Cited By ~ 20
Author(s):
I. Cervesato
◽
N. Durgin
◽
J. Mitchell
◽
P. Lincoln
◽
A. Scedrov
Keyword(s):
Protocol Analysis
◽
Security Protocol
Download Full-text
Rule-based dependency models for security protocol analysis
Integrated Computer-Aided Engineering
◽
10.3233/ica-2008-15407
◽
2008
◽
Vol 15
(4)
◽
pp. 369-380
◽
Cited By ~ 2
Author(s):
Qingfeng Chen
◽
Shichao Zhang
◽
Yi-Ping Phoebe Chen
Keyword(s):
Protocol Analysis
◽
Security Protocol
◽
Rule Based
Download Full-text
Cloud computing security protocol analysis with parity-based distributed file system
Annals of Operations Research
◽
10.1007/s10479-021-04413-5
◽
2021
◽
Author(s):
R. Dhaya
◽
R. Kanthavel
◽
Kanagaraj Venusamy
Keyword(s):
Cloud Computing
◽
Protocol Analysis
◽
File System
◽
Security Protocol
◽
Distributed File System
◽
Cloud Computing Security
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close