Pages that link to "Item:Q2474047"
From MaRDI portal
The following pages link to Automated verification of selected equivalences for security protocols (Q2474047):
Displayed 44 items.
- Deciding equivalence-based properties using constraint solving (Q391121) (← links)
- Reducing equational theories for the decision of static equivalence (Q437026) (← links)
- Decidability of equivalence of symbolic derivations (Q437031) (← links)
- Computing knowledge in security protocols under convergent equational theories (Q437033) (← links)
- Computing strong and weak bisimulations for psi-calculi (Q444457) (← links)
- Synthesis of opaque systems with static and dynamic masks (Q453510) (← links)
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946) (← links)
- Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach (Q540685) (← links)
- Encoding cryptographic primitives in a calculus with polyadic synchronisation (Q540687) (← links)
- A game-theoretic framework for specification and verification of cryptographic protocols (Q607405) (← links)
- Probability timed automata for investigating communication processes (Q747506) (← links)
- Deciding knowledge in security protocols under equational theories (Q860894) (← links)
- A spatial equational logic for the applied \(\pi \)-calculus (Q992517) (← links)
- CoSMed: a confidentiality-verified social media platform (Q1663221) (← links)
- A complete symbolic bisimulation for full applied pi calculus (Q1758155) (← links)
- A procedure for deciding symbolic equivalence between sets of constraint systems (Q2013557) (← links)
- CoCon: a conference management system with formally verified document confidentiality (Q2031419) (← links)
- Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity (Q2119978) (← links)
- Modular verification of protocol equivalence in the presence of randomness (Q2167715) (← links)
- Efficiently deciding equivalence for standard primitives and phases (Q2167745) (← links)
- Formalizing provable anonymity in Isabelle/HOL (Q2355379) (← links)
- Automated verification of selected equivalences for security protocols (Q2474047) (← links)
- A process calculus for privacy-preserving protocols in location-based service systems (Q2669244) (← links)
- Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later (Q2945721) (← links)
- Model Checking Security Protocols (Q3176380) (← links)
- SPEC: An Equivalence Checker for Security Protocols (Q3179281) (← links)
- Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System (Q3297470) (← links)
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (Q3304811) (← links)
- On Communication Models When Verifying Equivalence Properties (Q3304813) (← links)
- Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems (Q3449627) (← links)
- Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories (Q3460872) (← links)
- Implementing Spi Calculus Using Nominal Techniques (Q3507444) (← links)
- Challenges in the Automated Verification of Security Protocols (Q3541719) (← links)
- YAPA: A Generic Tool for Computing Intruder Knowledge (Q3636824) (← links)
- (Q4993330) (← links)
- (Q5089298) (← links)
- Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives (Q5179050) (← links)
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif (Q5253587) (← links)
- From Security Protocols to Pushdown Automata (Q5277904) (← links)
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (Q5747780) (← links)
- When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus (Q6041667) (← links)
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA (Q6104494) (← links)
- One vote is enough for analysing privacy (Q6173285) (← links)
- (Q6197212) (← links)