Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
Free Online Productivity Tools
i2Speak
i2Symbol
i2OCR
iTex2Img
iWeb2Print
iWeb2Shot
i2Type
iPdf2Split
iPdf2Merge
i2Bopomofo
i2Arabic
i2Style
i2Image
i2PDF
iLatex2Rtf
Sci2ools
27
click to vote
JAR
2011
favorite
Email
discuss
report
49
views
more
JAR 2011
»
A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems
13 years 5 months ago
Download
www.lsv.ens-cachan.fr
Véronique Cortier, Steve Kremer, Bogdan War
Real-time Traffic
JAR 2011
|
claim paper
Related Content
»
Symbolic Trace Analysis of Cryptographic Protocols
»
Computational soundness of symbolic zeroknowledge proofs
»
Towards computationally sound symbolic analysis of key exchange protocols
»
Security analysis of cryptographically controlled access to XML documents
»
Encryption overhead in embedded systems and sensor network nodes modeling and analysis
»
Formal Methods and Cryptography
»
Graphic Symbol Recognition Using Graph Based Signature and Bayesian Network Classifier
»
Symbolic performance analysis of elastic systems
»
The Origins and the Development of the ASM Method for High Level System Design and Analysi...
more »
Post Info
More Details (n/a)
Added
14 May 2011
Updated
14 May 2011
Type
Journal
Year
2011
Where
JAR
Authors
Véronique Cortier, Steve Kremer, Bogdan Warinschi
Comments
(0)
Researcher Info
JAR 2008 Study Group
Computer Vision