The NRL Protocol Analyzer: An Overview

From MaRDI portal
Revision as of 22:51, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:3128627


DOI10.1016/0743-1066(95)00095-XzbMath0871.68052MaRDI QIDQ3128627

Catherine A. Meadows

Publication date: 17 April 1997

Published in: The Journal of Logic Programming (Search for Journal in Brave)


68N17: Logic programming


Related Items

LTL model checking for security protocols, Automatic verification of temporal-epistemic properties of cryptographic protocols, Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Automating Security Analysis: Symbolic Equivalence of Constraint Systems, Web security: Authentication protocols and their analysis, NRL, Distributed temporal logic for the analysis of security protocol models, Relating state-based and process-based concurrency through linear logic (full-version), Complete symbolic reachability analysis using back-and-forth narrowing, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols, Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types, Finite-state analysis of two contract signing protocols, Analysis of security protocols as open systems, A new logic for electronic commerce protocols, Protocol insecurity with a finite number of sessions and composed keys is NP-complete., Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures, Rule-based static analysis of network protocol implementations, Hierarchical combination of intruder theories, Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically, Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols, Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties, The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols, Challenges in the Automated Verification of Security Protocols