The following pages link to AVISPA (Q15706):
Displayed 31 items.
- Propositional Tree Automata (Q3527283) (← links)
- Feasible Trace Reconstruction for Rewriting Approximations (Q3527288) (← links)
- The CL-Atse Protocol Analyser (Q3527301) (← links)
- Certifying a Tree Automata Completion Checker (Q3541727) (← links)
- A Complete Quantified Epistemic Logic for Reasoning about Message Passing Systems (Q3602954) (← links)
- Cryptographic Protocol Composition via the Authentication Tests (Q3617737) (← links)
- Comparing State Spaces in Automatic Security Protocol Analysis (Q3631370) (← links)
- YAPA: A Generic Tool for Computing Intruder Knowledge (Q3636824) (← links)
- Dynamic Tags for Security Protocols (Q4979449) (← links)
- (Q4993342) (← links)
- Computing knowledge in equational extensions of subterm convergent theories (Q5139279) (← links)
- Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives (Q5179050) (← links)
- LTL model checking for security protocols (Q5188173) (← links)
- Automatic verification of temporal-epistemic properties of cryptographic protocols (Q5188176) (← links)
- Computing Knowledge in Security Protocols under Convergent Equational Theories (Q5191113) (← links)
- Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model (Q5195250) (← links)
- Deciding Security for Protocols with Recursive Tests (Q5200014) (← links)
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif (Q5253587) (← links)
- (Q5270090) (← links)
- Automated Verification of Equivalence Properties of Cryptographic Protocols (Q5278194) (← links)
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions (Q5385984) (← links)
- Functional Correctness Proofs of Encryption Algorithms (Q5387863) (← links)
- Deciding Key Cycles for Security Protocols (Q5387901) (← links)
- (Q5422283) (← links)
- (Q5422291) (← links)
- SAT-Based Verification of Security Protocols Via Translation to Networks of Automata (Q5423888) (← links)
- Safely Composing Security Protocols (Q5458848) (← links)
- A Formal Analysis of Complex Type Flaw Attacks on Security Protocols (Q5505422) (← links)
- From One Session to Many: Dynamic Tags for Security Protocols (Q5505548) (← links)
- Cryptographically Sound Security Proofs for Basic and Public-Key Kerberos (Q5862527) (← links)
- Foundations of Software Science and Computation Structures (Q5899104) (← links)