Amanote Research

Amanote Research

    RegisterSign In

The TAMARIN Prover for the Symbolic Analysis of Security Protocols

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-39799-8_48
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2013

Authors
Simon MeierBenedikt SchmidtCas CremersDavid Basin
Publisher

Springer Berlin Heidelberg


Related search

A Decidable Analysis of Security Protocols

English

Analysis of the IBM CCA Security API Protocols in Maude-Npa

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2014English

The Dining Freemasons (Security Protocols for Secret Societies)

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2007English

Comparative Analysis of Wireless Security Protocols and Issues

International Journal of Trend in Scientific Research and Development
2018English

Security Analysis of Reliable Transport Layer Protocols for Wireless Sensor Networks

2010English

On the Secure Implementation of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2003English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Analysis of OSPF Security According to the Keying and Authentication for Routing Protocols (KARP) Design Guide

2013English

Verification of Security Protocols

English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy