Pages that link to "Item:Q557799"
From MaRDI portal
The following pages link to An NP decision procedure for protocol insecurity with XOR (Q557799):
Displayed 22 items.
- Decidability and combination results for two notions of knowledge in security protocols (Q437043) (← links)
- Bounded memory Dolev-Yao adversaries in collaborative systems (Q462499) (← links)
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685) (← links)
- An NP decision procedure for protocol insecurity with XOR (Q557799) (← links)
- A method for symbolic analysis of security protocols (Q557806) (← links)
- Deciding knowledge in security protocols under equational theories (Q860894) (← links)
- On the semantics of Alice \& Bob specifications of security protocols (Q860900) (← links)
- A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties (Q860906) (← links)
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (Q880981) (← links)
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis (Q931442) (← links)
- Bounded memory protocols (Q2339157) (← links)
- Symbolic protocol analysis for monoidal equational theories (Q2482449) (← links)
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (Q2484410) (← links)
- Deciding knowledge in security protocols under some e-voting theories (Q3095038) (← links)
- Challenges in the Automated Verification of Security Protocols (Q3541719) (← links)
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables (Q3631368) (← links)
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (Q3636822) (← links)
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions (Q3636823) (← links)
- YAPA: A Generic Tool for Computing Intruder Knowledge (Q3636824) (← links)
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif (Q5253587) (← links)
- On Simulatability Soundness and Mapping Soundness of Symbolic Cryptography (Q5458826) (← links)
- A Proof Theoretic Analysis of Intruder Theories (Q5902125) (← links)