Back to Results
First PageMeta Content
Mathematics / Prime-counting function / Cryptographic nonce / Π-calculus / Data / Cyberwarfare / Otway–Rees protocol / Cryptographic protocols / Cryptography / Reflection attack


Compositional Analysis of Authentication Protocols ? Michele Bugliesi, Riccardo Focardi, and Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy {mi
Add to Reading List

Document Date: 2005-06-07 06:44:01


Open Document

File Size: 208,78 KB

Share Result on Facebook

Company

Mobile Distributed Systems / E NV / C s`M E NV / /

Currency

pence / /

/

Event

FDA Phase / /

IndustryTerm

authentication protocol / i.e. protocols / shared-key authentication protocols / entity authentication protocols / companion transition systems / type systems / authentication protocols / security protocols / /

Organization

European Union / /

Person

Bob / Michele Bugliesi / Matteo Maffei Dipartimento di Informatica / Verif / B. Specifically / Riccardo Focardi / /

Product

I1 / Protocol2 / Example / I2 / Alice / /

ProvinceOrState

Alberta / /

Technology

encryption / alpha / authentication protocol / cryptography / 1 Introduction Security protocols / Authentication Protocols / shared-key authentication protocols / entity authentication protocols / one-step protocol / security protocols / i.e. protocols / same protocol / model-check protocols / spi Protocol / /

SocialTag