Pages that link to "Item:Q5747780"
From MaRDI portal
The following pages link to Automating Security Analysis: Symbolic Equivalence of Constraint Systems (Q5747780):
Displaying 10 items.
- Decidability of equivalence of symbolic derivations (Q437031) (← links)
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946) (← links)
- A procedure for deciding symbolic equivalence between sets of constraint systems (Q2013557) (← links)
- POR for security protocol equivalences. Beyond action-determinism (Q2167736) (← links)
- Stateful applied pi calculus: observational equivalence and labelled bisimilarity (Q2397042) (← links)
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (Q3304811) (← links)
- On Communication Models When Verifying Equivalence Properties (Q3304813) (← links)
- Automated Verification of Equivalence Properties of Cryptographic Protocols (Q5278194) (← links)
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (Q5747780) (← links)
- DeepSec: deciding equivalence properties for security protocols -- improved theory and practice (Q6566464) (← links)