AVISPA

From MaRDI portal
Revision as of 20:07, 5 March 2024 by Import240305080343 (talk | contribs) (Created automatically from import240305080343)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Software:15706



swMATH3172MaRDI QIDQ15706


No author found.





Related Items (81)

Model Checking Security ProtocolsThe Applied Pi CalculusValidating Security Protocols under the General AttackerMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesThe Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsOn the semantics of Alice \& Bob specifications of security protocolsInjective synchronisation: An extension of the authentication hierarchyFormal analysis and offline monitoring of electronic examsIntruder deduction for the equational theory of abelian groups with distributive encryptionAlice and Bob Meet Equational TheoriesEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterDeciding equivalence-based properties using constraint solvingUnnamed ItemDesigning and Verifying Core Protocols for Location PrivacyModeling and Analysis of Security Protocols Using Role Based Specifications and Petri NetsComputing knowledge in security protocols under convergent equational theoriesA Protocol for Secure Public Instant MessagingTowards an Automatic Analysis of Web Service SecurityHandling Algebraic Properties in Automatic Analysis of Security ProtocolsPropositional Tree AutomataFeasible Trace Reconstruction for Rewriting ApproximationsThe CL-Atse Protocol AnalyserUnnamed ItemSender access and data distribution control for inter-domain multicast groupsModeling and verifying ad hoc routing protocolsComputationally Sound Symbolic Secrecy in the Presence of Hash FunctionsCertifying a Tree Automata Completion CheckerFunctional Correctness Proofs of Encryption AlgorithmsDeciding Key Cycles for Security ProtocolsComputing knowledge in equational extensions of subterm convergent theoriesAutomated type-based analysis of injective agreement in the presence of compromised principalsBeyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsOn Communication Models When Verifying Equivalence PropertiesSecurity protocols analysis including various time parametersIntruder deduction problem for locally stable theories with normal forms and inversesComposition of password-based protocolsOn the relationships between models in protocol verificationBreaking and fixing public-key KerberosA framework for compositional verification of security protocolsSeVe: automatic tool for verification of security protocolsMulti-attacker protocol validationSAT-Based Verification of Security Protocols Via Translation to Networks of AutomataA semantics for behavior trees using CSP with specification commandsDistributed temporal logic for the analysis of security protocol modelsTree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic PrimitivesA procedure for deciding symbolic equivalence between sets of constraint systemsSymbolic protocol analysis in the union of disjoint intruder theories: combining decision proceduresLTL model checking for security protocolsAutomatic verification of temporal-epistemic properties of cryptographic protocolsComputing Knowledge in Security Protocols under Convergent Equational TheoriesA Complete Quantified Epistemic Logic for Reasoning about Message Passing SystemsA decidable class of security protocols for both reachability and equivalence propertiesESAP: efficient and secure authentication protocol for roaming user in mobile communication networksDeciding Security for Protocols with Recursive TestsTermination criteria for tree automata completionCryptographic Protocol Composition via the Authentication TestsSafely Composing Security ProtocolsFormal analysis of security protocols for wireless sensor networksAutomated Verification of Equivalence Properties of Cryptographic ProtocolsComparing State Spaces in Automatic Security Protocol AnalysisMulticast receiver access control by IGMP-ACCombining proverif and automated theorem provers for security protocol verificationYAPA: A Generic Tool for Computing Intruder KnowledgeAn Introduction to Security API AnalysisDeciding knowledge in security protocols under some e-voting theoriesDynamic Tags for Security ProtocolsFoundations of Software Science and Computation StructuresSafely composing security protocolsEphemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environmentsA Formal Analysis of Complex Type Flaw Attacks on Security ProtocolsFrom One Session to Many: Dynamic Tags for Security ProtocolsFormalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol ModelAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifYAPAProtocol Composition Logic (PCL)Cryptographically Sound Security Proofs for Basic and Public-Key KerberosUnnamed ItemUnnamed ItemExplicit Randomness is not Necessary when Modeling Probabilistic EncryptionComputational Soundness of Symbolic Analysis for Protocols Using Hash FunctionsSimulation based security in the applied pi calculus


This page was built for software: AVISPA