ON THE SECURITY OF P-PARTY PROTOCOLS.

被引:0
|
作者
Pan, Luquan [1 ]
机构
[1] Bell Communications Research,, Piscataway, NJ, USA, Bell Communications Research, Piscataway, NJ, USA
来源
Discrete Applied Mathematics | 1988年 / 20卷 / 02期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
CRYPTOGRAPHY
引用
收藏
页码:127 / 144
相关论文
共 50 条
  • [1] ON THE SECURITY OF P-PARTY PROTOCOLS
    PAN, LQ
    DISCRETE APPLIED MATHEMATICS, 1988, 20 (02) : 127 - 144
  • [2] Deciding Security Properties for Cryptographic Protocols. Application to Key Cycles
    Comon-Lundh, Hubert
    Cortier, Veronique
    Zalinescu, Eugen
    ACM TRANSACTIONS ON COMPUTATIONAL LOGIC, 2010, 11 (02)
  • [3] TRACING PROTOCOLS.
    Holzmann, Gerard J.
    1987, : 189 - 207
  • [4] Educating Cryptography using Formal Security Verification tool for Cryptographic Protocols.
    Okazaki H.
    Shimura S.
    Miyamoto T.
    Watanabe T.
    Murakami Y.
    Futa Y.
    Computer Software, 2020, 37 (01) : 99 - 113
  • [5] PRESUMED ABORT PROTOCOLS.
    Lindsay, B.
    Mohan, C.
    1600, (26):
  • [6] Internet core protocols.
    Gillespie, T
    LIBRARY JOURNAL, 2000, 125 (12) : 134 - 134
  • [7] Validating Communication Protocols.
    Conti, G.
    1600, (46):
  • [8] PRESUMED COMMIT PROTOCOLS.
    Lindsay, B.
    Mohan, C.
    IBM technical disclosure bulletin, 1983, 26 (7 A): : 3382 - 3383
  • [9] PERFORMANCE EVALUATION OF MAGNET PROTOCOLS.
    El Zarki, Magda
    Lazar, Aurel A.
    Patir, Avshalom
    Takahashi, Tatsuro
    Advances in Telecommunication Networks Series, 1986, : 137 - 154
  • [10] DEVELOPMENT TOOLS FOR COMMUNICATION PROTOCOLS.
    Nounou, Nihal
    Yemini, Yechiam
    1987, : 257 - 304