The following pages link to (Q4418589):
Displayed 26 items.
- An NP decision procedure for protocol insecurity with XOR (Q557799) (← links)
- Simulation relations for alternating Büchi automata (Q557801) (← links)
- A method for symbolic analysis of security protocols (Q557806) (← links)
- An undecidability result for AGh (Q859845) (← links)
- A (restricted) quantifier elimination for security protocols (Q860909) (← links)
- Decidability issues for extended ping-pong protocols (Q861694) (← links)
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks (Q861696) (← links)
- Intruder deduction for the equational theory of abelian groups with distributive encryption (Q876047) (← links)
- Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types (Q880987) (← links)
- On the freedom of decryption (Q1007641) (← links)
- Safely composing security protocols (Q1028731) (← links)
- Authentication tests and the structure of bundles. (Q1603655) (← links)
- Finite-state analysis of two contract signing protocols (Q1603658) (← links)
- Verification of cryptographic protocols: tagging enforces termination (Q1770413) (← links)
- Tree automata with one memory set constraints and cryptographic protocols (Q1770429) (← links)
- On the symbolic reduction of processes with cryptographic functions. (Q1853612) (← links)
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete. (Q1874404) (← links)
- A probabilistic polynomial-time process calculus for the analysis of cryptographic protocols (Q2368990) (← links)
- On the relationships between models in protocol verification (Q2482448) (← links)
- Contract signing, optimism, and advantage (Q2484408) (← links)
- Pattern-matching spi-calculus (Q2500522) (← links)
- Verifying Cryptographic Protocols with Subterms Constraints (Q3498465) (← links)
- Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables (Q3631368) (← links)
- Comparing State Spaces in Automatic Security Protocol Analysis (Q3631370) (← links)
- Flat and One-Variable Clauses for Single Blind Copying Protocols: The XOR Case (Q3636822) (← links)
- Bounding Messages for Free in Security Protocols (Q5458850) (← links)