Subject
Computational Theory and Mathematics,Logic,Theoretical Computer Science,Software
Reference97 articles.
1. Analyzing security protocols with secrecy types and logic programs;Abadi;J. ACM,2005
2. Security protocols and their properties;Abadi,2000
3. R. Accorsi, D. Basin, L. Viganò, Towards an awareness-based semantics for security protocol analysis, in: Proceedings of the Post-CAV Workshop on Logical Aspects of Cryptographic Protocol Verification, 2001.
4. A new logic for electronic commerce protocols;Adi;Theor. Comput. Sci.,2003
5. M. Abadi, C. Fournet, Mobile values, new names, and secure communication, in: Proceedings of the ACM Symposium on Principles of Programming Languages, 2001.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Group Anonymity in Security Protocols;Proceedings of the 2018 Federated Conference on Computer Science and Information Systems;2018-09-26
2. Epistemic Logic Based on Dolev-Yao Model;Anais do II Encontro de Teoria da Computação (ETC 2017);2017-07-02
3. Reasoning about minimal anonymity in security protocols;Future Generation Computer Systems;2013-03
4. Complexity of Anonymity for Security Protocols;Computer Security – ESORICS 2010;2010