From post

A Game-Based Verification of Non-repudiation and Fair Exchange Protocols.

, и . CONCUR, том 2154 из Lecture Notes in Computer Science, стр. 551-565. Springer, (2001)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Game Analysis of Abuse-free Contract Signing., и . CSFW, стр. 206-. IEEE Computer Society, (2002)Hash Gone Bad: Automated discovery of protocol attacks that exploit hash function weaknesses., , , , , и . USENIX Security Symposium, стр. 5899-5916. USENIX Association, (2023)Fair multi-party non-repudiation protocols., и . Int. J. Inf. Sec., 1 (4): 223-235 (2003)07421 Executive Summary -- Formal Protocol Verification Applied., , и . Formal Protocol Verification Applied, том 07421 из Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany, (2007)Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols., , , и . POST, том 10204 из Lecture Notes in Computer Science, стр. 117-140. Springer, (2017)An Extensive Formal Analysis of Multi-factor Authentication Protocols., и . CSF, стр. 1-15. IEEE Computer Society, (2018)Analysing the Vulnerability of Protocols to Produce Known-pair and Chosen-text Attacks., и . SecCo, том 128 из Electronic Notes in Theoretical Computer Science, стр. 87-104. Elsevier, (2004)An Optimistic Non-repudiation Protocol with Transparent Trusted Third Party., и . ISC, том 2200 из Lecture Notes in Computer Science, стр. 363-378. Springer, (2001)Introduction., и . Formal Models and Techniques for Analyzing Security Protocols, том 5 из Cryptology and Information Security Series, IOS Press, (2011)Symbolic protocol verification with dice: process equivalences in the presence of probabilities., , и . CSF, стр. 319-334. IEEE, (2022)