Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/647092.714095guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Formal Verification of Cryptographic Protocols: A Survey

Published: 28 November 1994 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
ASIACRYPT '94: Proceedings of the 4th International Conference on the Theory and Applications of Cryptology: Advances in Cryptology
November 1994
400 pages
ISBN:354059339X

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 28 November 1994

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 25 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2018)An Algorithmic Approach to Formally Verify an ECC LibraryACM Transactions on Design Automation of Electronic Systems10.1145/322420523:5(1-26)Online publication date: 25-Aug-2018
  • (2013)Towards the Correctness of Security ProtocolsElectronic Notes in Theoretical Computer Science (ENTCS)10.1016/S1571-0661(03)50004-483(55-98)Online publication date: 1-Jan-2013
  • (2011)Efficient general unification for XOR with homomorphismProceedings of the 23rd international conference on Automated deduction10.5555/2032266.2032297(407-421)Online publication date: 31-Jul-2011
  • (2008)An integrated framework for security protocol analysisProceedings of the 2008 ACM symposium on Information, computer and communications security10.1145/1368310.1368325(77-86)Online publication date: 18-Mar-2008
  • (2008)SledeProceedings of the first ACM conference on Wireless network security10.1145/1352533.1352551(109-118)Online publication date: 31-Mar-2008
  • (2007)Intrusion attack tactics for the model checking of e-commerce security guaranteesProceedings of the 26th international conference on Computer Safety, Reliability, and Security10.5555/2392550.2392578(238-251)Online publication date: 18-Sep-2007
  • (2005)Tailoring the Dolev-Yao abstraction to web services realitiesProceedings of the 2005 workshop on Secure web services10.1145/1103022.1103035(65-74)Online publication date: 11-Nov-2005
  • (2005)On the security of the canetti-krawczyk modelProceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II10.1007/11596981_53(356-363)Online publication date: 15-Dec-2005
  • (2005)A framework based approach for formal modeling and analysis of multi-level attacks in computer networksProceedings of the 25th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems10.1007/11562436_19(247-260)Online publication date: 2-Oct-2005
  • (2005)A formal security analysis of an OSA/Parlay authentication interfaceProceedings of the 7th IFIP WG 6.1 international conference on Formal Methods for Open Object-Based Distributed Systems10.1007/11494881_9(131-146)Online publication date: 15-Jun-2005
  • Show More Cited By

View Options

View options

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media