Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/794198.795103guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Towards a Completeness Result for Model Checking of Security Protocols

Published: 09 June 1998 Publication History

Abstract

No abstract available.

Cited By

View all
  • (2019)Typing Messages for Free in Security ProtocolsACM Transactions on Computational Logic10.1145/334350721:1(1-52)Online publication date: 12-Sep-2019
  • (2010)Detecting and preventing type flaws at static timeJournal of Computer Security10.5555/1804632.180463518:2(229-264)Online publication date: 1-Apr-2010
  • (2010)Deciding security properties for cryptographic protocols. application to key cyclesACM Transactions on Computational Logic10.1145/1656242.165624411:2(1-42)Online publication date: 22-Jan-2010
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
CSFW '98: Proceedings of the 11th IEEE workshop on Computer Security Foundations
June 1998
ISBN:0818684887

Publisher

IEEE Computer Society

United States

Publication History

Published: 09 June 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 29 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2019)Typing Messages for Free in Security ProtocolsACM Transactions on Computational Logic10.1145/334350721:1(1-52)Online publication date: 12-Sep-2019
  • (2010)Detecting and preventing type flaws at static timeJournal of Computer Security10.5555/1804632.180463518:2(229-264)Online publication date: 1-Apr-2010
  • (2010)Deciding security properties for cryptographic protocols. application to key cyclesACM Transactions on Computational Logic10.1145/1656242.165624411:2(1-42)Online publication date: 22-Jan-2010
  • (2007)Synthesizing secure protocolsProceedings of the 12th European conference on Research in Computer Security10.5555/2393847.2393884(406-421)Online publication date: 24-Sep-2007
  • (2007)Intrusion attack tactics for the model checking of e-commerce security guaranteesProceedings of the 26th international conference on Computer Safety, Reliability, and Security10.5555/2392550.2392578(238-251)Online publication date: 18-Sep-2007
  • (2006)A Decision Procedure for Structured Cryptographic ProtocolsProceedings of the 2006 conference on New Trends in Software Methodologies, Tools and Techniques: Proceedings of the fifth SoMeT_0610.5555/1565321.1565344(272-286)Online publication date: 28-May-2006
  • (2005)An approach to handle real time and probabilistic behaviors in e-commerceProceedings of the 2005 ACM symposium on Applied computing10.1145/1066677.1066864(815-820)Online publication date: 13-Mar-2005
  • (2004)Security as a new dimension in embedded system designProceedings of the 41st annual Design Automation Conference10.1145/996566.996771(753-760)Online publication date: 7-Jun-2004
  • (2004)Automatic verification of the TLS handshake protocolProceedings of the 2004 ACM symposium on Applied computing10.1145/967900.968063(789-794)Online publication date: 14-Mar-2004
  • (2004)Authenticity by tagging and typingProceedings of the 2004 ACM workshop on Formal methods in security engineering10.1145/1029133.1029135(1-12)Online publication date: 29-Oct-2004
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media