Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties (Q3184784): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
ReferenceBot (talk | contribs)
Changed an Item
 
Property / cites work
 
Property / cites work: Deciding knowledge in security protocols under equational theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unification modulo ACUI plus distributivity axioms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computer Aided Verification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2751360 / rank
 
Normal rank
Property / cites work
 
Property / cites work: YAPA: A Generic Tool for Computing Intruder Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical combination of intruder theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing Knowledge in Security Protocols under Convergent Equational Theories / rank
 
Normal rank
Property / cites work
 
Property / cites work: All about Maude -- a high-performance logical framework. How to specify, program and verify systems in rewriting logic. With CD-ROM. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Term Rewriting and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the security of public key protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic Model Checking of Infinite-State Systems Using Narrowing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Variant Narrowing and Equational Unification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Effectively Checking the Finite Variant Property / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3664457 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2848034 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Information and Communications Security / rank
 
Normal rank
Property / cites work
 
Property / cites work: The NRL Protocol Analyzer: An Overview / rank
 
Normal rank
Property / cites work
 
Property / cites work: Conditional rewriting logic as a unified model of concurrency / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3839051 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the freedom of decryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Protocol insecurity with a finite number of sessions and composed keys is NP-complete. / rank
 
Normal rank
Property / cites work
 
Property / cites work: An attack on a recursive authentication protocol. A cautionary tale / rank
 
Normal rank
Property / cites work
 
Property / cites work: Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties / rank
 
Normal rank
Property / cites work
 
Property / cites work: Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols / rank
 
Normal rank

Latest revision as of 02:39, 2 July 2024

scientific article
Language Label Description Also known as
English
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
scientific article

    Statements

    Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties (English)
    0 references
    0 references
    0 references
    0 references
    22 October 2009
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references