Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions. Fattahi, J., Mejri, M., & Pricop, E. In 2015 IEEE International Conference on Systems, Man, and Cybernetics, Kowloon Tong, Hong Kong, October 9-12, 2015, pages 1189–1196, 2015. IEEE. Paper doi bibtex @inproceedings{DBLP:conf/smc/FattahiMP15,
author = {Jaouhar Fattahi and
Mohamed Mejri and
Emil Pricop},
title = {Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions},
booktitle = {2015 {IEEE} International Conference on Systems, Man, and Cybernetics,
Kowloon Tong, Hong Kong, October 9-12, 2015},
pages = {1189--1196},
publisher = {{IEEE}},
year = {2015},
url = {https://doi.org/10.1109/SMC.2015.213},
doi = {10.1109/SMC.2015.213},
timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
biburl = {https://dblp.org/rec/conf/smc/FattahiMP15.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"ZJ6FrDcodWrJLEC7n","bibbaseid":"fattahi-mejri-pricop-trackingsecurityflawsincryptographicprotocolsusingwitnessfunctions-2015","author_short":["Fattahi, J.","Mejri, M.","Pricop, E."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Jaouhar"],"propositions":[],"lastnames":["Fattahi"],"suffixes":[]},{"firstnames":["Mohamed"],"propositions":[],"lastnames":["Mejri"],"suffixes":[]},{"firstnames":["Emil"],"propositions":[],"lastnames":["Pricop"],"suffixes":[]}],"title":"Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions","booktitle":"2015 IEEE International Conference on Systems, Man, and Cybernetics, Kowloon Tong, Hong Kong, October 9-12, 2015","pages":"1189–1196","publisher":"IEEE","year":"2015","url":"https://doi.org/10.1109/SMC.2015.213","doi":"10.1109/SMC.2015.213","timestamp":"Wed, 16 Oct 2019 14:14:51 +0200","biburl":"https://dblp.org/rec/conf/smc/FattahiMP15.bib","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/smc/FattahiMP15,\n author = {Jaouhar Fattahi and\n Mohamed Mejri and\n Emil Pricop},\n title = {Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions},\n booktitle = {2015 {IEEE} International Conference on Systems, Man, and Cybernetics,\n Kowloon Tong, Hong Kong, October 9-12, 2015},\n pages = {1189--1196},\n publisher = {{IEEE}},\n year = {2015},\n url = {https://doi.org/10.1109/SMC.2015.213},\n doi = {10.1109/SMC.2015.213},\n timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},\n biburl = {https://dblp.org/rec/conf/smc/FattahiMP15.bib},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Fattahi, J.","Mejri, M.","Pricop, E."],"key":"DBLP:conf/smc/FattahiMP15","id":"DBLP:conf/smc/FattahiMP15","bibbaseid":"fattahi-mejri-pricop-trackingsecurityflawsincryptographicprotocolsusingwitnessfunctions-2015","role":"author","urls":{"Paper":"https://doi.org/10.1109/SMC.2015.213"},"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"https://dblp.org/pid/141/8033.bib","dataSources":["WKGTRRZ82WRAAb4BL","hJ9b6eCN8bT9KvtQ6"],"keywords":[],"search_terms":["tracking","security","flaws","cryptographic","protocols","using","witness","functions","fattahi","mejri","pricop"],"title":"Tracking Security Flaws in Cryptographic Protocols Using Witness-Functions","year":2015}