The following pages link to (Q4484506):
Displayed 6 items.
- A method for symbolic analysis of security protocols (Q557806) (← links)
- On the semantics of Alice \& Bob specifications of security protocols (Q860900) (← links)
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis (Q931442) (← links)
- Verification of cryptographic protocols: tagging enforces termination (Q1770413) (← links)
- Linearity, Persistence and Testing Semantics in the Asynchronous Pi-Calculus (Q2864372) (← links)
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols (Q3184787) (← links)