Back to Results
First PageMeta Content
Temporal logic / Model theory / Propositional calculus / Mathematical logic / Interpretation / Substitution / Well-formed formula / Logic / Formal languages / Linear temporal logic


Electronic Notes in Theoretical Computer ScienceURL: http://www.elsevier.nl/locate/entcs/volume83.html 32 pages Secure Protocol Composition Anupam Datta 1 Ante Derek 1 John C. Mitchell 1 Computer Science Depar
Add to Reading List

Document Date: 2004-05-03 19:17:14


Open Document

File Size: 306,53 KB

Share Result on Facebook

City

Palo Alto / /

Company

Elsevier Science B. V. / Needham / /

Currency

pence / /

/

Event

FDA Phase / /

Facility

Kestrel Institute / /

IndustryTerm

signature-based challenge response protocol / basic key exchange protocol / multi-mode protocol / sub-protocols / security protocol / composite protocol / compound protocols / secure sub-protocols / individual protocol / public-key protocol / network protocols / temporal operator / security protocols / /

Organization

VER / U.S. Securities and Exchange Commission / Stanford University Stanford / /

Person

Anupam Datta / /

Position

hB / /

Product

ISO-9798-3 / ISO9798-3 / /

ProvinceOrState

X / California / /

PublishedMedium

Electronic Notes in Theoretical Computer Science / /

SportsLeague

AF2 / /

Technology

encryption / cryptography / multi-mode protocol / composing security protocols / public-key protocol / security protocol / individually secure sub-protocols / public key / composite protocol / key exchange protocols / compound protocols / Diffie-Hellman key exchange protocol / private key / security protocols / two protocols / understanding protocols / same protocol / signature-based challenge response protocol / SSL / ISO-9798-3 protocol / basic key exchange protocol / network protocols / /

URL

http /

SocialTag