Leakiness is decidable for well-founded protocols

被引:3
|
作者
Fröschle, Sibylle [1 ]
机构
[1] OFFIS and University of Oldenburg, Oldenburg,26121, Germany
关键词
Algorithmic verification - Secrecy properties - Security properties - Security protocols - Undecidability;
D O I
10.1007/978-3-662-46666-7_10
中图分类号
学科分类号
摘要
引用
收藏
页码:176 / 195
相关论文
共 50 条
  • [1] A well-founded, scientifically well-founded Basic Education
    Beratung, Technische
    ELEKTROTECHNIK UND INFORMATIONSTECHNIK, 2009, 126 (10):
  • [2] Efficient Approximation of Well-Founded Justification and Well-Founded Domination
    Drescher, Christian
    Walsh, Toby
    LOGIC PROGRAMMING AND NONMONOTONIC REASONING (LPNMR 2013), 2013, 8148 : 277 - 289
  • [3] 'Well-Founded Fear'
    Rosen, R
    FILM COMMENT, 2000, 36 (02) : 46 - 46
  • [4] Well-founded fear
    Jaffe, H
    AMERICAN BOOK REVIEW, 2001, 22 (02) : 16 - 16
  • [5] THE WELL-FOUNDED ALGEBRAS
    MONTAGNA, F
    ALGEBRA UNIVERSALIS, 1983, 16 (01) : 38 - 46
  • [6] 'Well-Founded Fear'
    Santella, A
    NEW YORK TIMES BOOK REVIEW, 2000, : 35 - 35
  • [7] WELL-FOUNDED FEAR
    Washington, John
    NATION, 2020, 310 (13) : 22 - 26
  • [8] Well-Founded Unions
    Dawson, Jeremy
    Dershowitz, Nachum
    Gore, Rajeev
    AUTOMATED REASONING, IJCAR 2018, 2018, 10900 : 117 - 133
  • [9] A WELL-FOUNDED FEAR
    FRANEY, R
    NEW STATESMAN & SOCIETY, 1989, 2 (69): : 18 - 19
  • [10] The basis for well-founded simulations
    Meyer, O.
    Rall, M.
    Baschnegger, H.
    Lazarovici, M.
    Urban, B.
    ANAESTHESIST, 2016, 65 (12): : 943 - 950