dx.doi.org/10.1007/978-3-642-02658-4_5
Preview meta tags from the dx.doi.org website.
Linked Hostnames
22- 44 links toscholar.google.com
- 25 links tolink.springer.com
- 13 links todx.doi.org
- 10 links todoi.org
- 10 links towww.springernature.com
- 7 links towww.emis.de
- 6 links towww.ams.org
- 4 links tocitation-needed.springer.com
Thumbnail

Search Engine Appearance
Models and Proofs of Protocol Security: A Progress Report
This paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.
Bing
Models and Proofs of Protocol Security: A Progress Report
This paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.
DuckDuckGo
Models and Proofs of Protocol Security: A Progress Report
This paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.
General Meta Tags
41- titleModels and Proofs of Protocol Security: A Progress Report | SpringerLink
- charsetUTF-8
- X-UA-CompatibleIE=edge
- viewportwidth=device-width, initial-scale=1
- applicable-devicepc,mobile
Open Graph Meta Tags
6- og:urlhttps://link.springer.com/chapter/10.1007/978-3-642-02658-4_5
- og:typePaper
- og:site_nameSpringerLink
- og:titleModels and Proofs of Protocol Security: A Progress Report
- og:descriptionThis paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.
Twitter Meta Tags
6- twitter:siteSpringerLink
- twitter:cardsummary
- twitter:image:altContent cover image
- twitter:titleModels and Proofs of Protocol Security: A Progress Report
- twitter:descriptionThis paper discusses progress in the verification of security protocols. Focusing on a small, classic example, it stresses the use of program-like representations of protocols, and their automatic analysis in symbolic and computational models.
Item Prop Meta Tags
3- position1
- position2
- position3
Link Tags
9- apple-touch-icon/oscar-static/img/favicons/darwin/apple-touch-icon-6ef0829b9c.png
- canonicalhttps://link.springer.com/chapter/10.1007/978-3-642-02658-4_5
- icon/oscar-static/img/favicons/darwin/android-chrome-192x192.png
- icon/oscar-static/img/favicons/darwin/favicon-32x32.png
- icon/oscar-static/img/favicons/darwin/favicon-16x16.png
Links
139- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Bruno%20Blanchet%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Hubert%20Comon-Lundh%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://scholar.google.co.uk/scholar?as_q=&num=10&btnG=Search+Scholar&as_epq=&as_oq=&as_eq=&as_occt=any&as_sauthors=%22Mart%C3%ADn%20Abadi%22&as_publication=&as_ylo=&as_yhi=&as_allsubj=all&hl=en
- http://www.ams.org/mathscinet-getitem?mr=1896467
- http://www.ams.org/mathscinet-getitem?mr=1903446