Amanote Research

Amanote Research

    RegisterSign In

Secrecy for Bounded Security Protocols With Freshness Check Is NEXPTIME-complete*

Journal of Computer Security - Netherlands
doi 10.3233/jcs-2007-0306
Full Text
Open PDF
Abstract

Available in full text

Categories
RiskComputer NetworksHardwareCommunicationsReliabilitySafetyArchitectureQualitySoftware
Date

November 3, 2008

Authors
Ferucio L. ŢipleaCătălin V. BîrjoveanuConstantin EneaIoana Boureanu
Publisher

IOS Press


Related search

An Extensible Platform for Evaluating Security Protocols

English

Modular Security Proofs for Key Agreement Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2005English

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Analyzing Internet Security Protocols

English

Formal Methods for Assuring Security of Protocols

Computer Journal
Computer Science
2002English

Verification of Security Protocols

English

Improving Automatic Verification of Security Protocols With XOR

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2009English

Configurable Security Protocols for Multi-Party Data Analysis With Malicious Participants

English

An Improvement on Secure E-Mail Protocols Providing Perfect Forward Secrecy

2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy