{"title":"Principles of Remote Sattestation","authors":"P. Syverson","doi":"10.1007/978-3-030-91631-2_23","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_23","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"07 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127183699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic Protocol Analysis and Compilation Using CPSA and Roletran","authors":"John D. Ramsdell","doi":"10.1007/978-3-030-91631-2_20","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_20","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124236993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Searching for Selfie in TLS 1.3 with the Cryptographic Protocol Shapes Analyzer","authors":"Prajna Bhandary, Edward Zieglar, Charles Nicholas","doi":"10.1007/978-3-030-91631-2_3","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_3","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125664206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
K. Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, R. Küsters, G. Schmitz, Tim Würtele
{"title":"A Tutorial-Style Introduction to DY*","authors":"K. Bhargavan, Abhishek Bichhawat, Quoc Huy Do, Pedram Hosseyni, R. Küsters, G. Schmitz, Tim Würtele","doi":"10.1007/978-3-030-91631-2_4","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_4","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124890863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Benign Interaction of Security Domains","authors":"F. Nielson, René Rydhof Hansen, H. R. Nielson","doi":"10.1007/978-3-030-91631-2_17","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_17","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131519560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"How to Explain Security Protocols to Your Children","authors":"V. Cortier, Itsaka Rakotonirina","doi":"10.1007/978-3-030-91631-2_6","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_6","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134598411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On Orderings in Security Models","authors":"Paul D. Rowe","doi":"10.1007/978-3-030-91631-2_21","DOIUrl":"https://doi.org/10.1007/978-3-030-91631-2_21","url":null,"abstract":"","PeriodicalId":206169,"journal":{"name":"Protocols, Strands, and Logic","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126568206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}