The following pages link to (Q4535055):
Displayed 19 items.
- An NP decision procedure for protocol insecurity with XOR (Q557799) (← links)
- Simulation relations for alternating Büchi automata (Q557801) (← links)
- A method for symbolic analysis of security protocols (Q557806) (← links)
- Decidability issues for extended ping-pong protocols (Q861694) (← links)
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis (Q931442) (← links)
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (Q2268100) (← links)
- Models and emerging trends of concurrent constraint programming (Q2348541) (← links)
- A semantic framework for open processes (Q2463561) (← links)
- Transducer-based analysis of cryptographic protocols (Q2464141) (← links)
- Hierarchical combination of intruder theories (Q2482450) (← links)
- A static analysis of cryptographic processes: the denotational approach (Q2484412) (← links)
- A symbolic decision procedure for cryptographic protocols with time stamps (Q2568115) (← links)
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (Q2643568) (← links)
- Formalising Observer Theory for Environment-Sensitive Bisimulation (Q3183528) (← links)
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols (Q3184787) (← links)
- On-the-Fly Model Checking of Fair Non-repudiation Protocols (Q3510820) (← links)
- Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol (Q3540086) (← links)
- Comparing State Spaces in Automatic Security Protocol Analysis (Q3631370) (← links)
- A Proof Theoretic Analysis of Intruder Theories (Q5902125) (← links)