The following pages link to (Q2767013):
Displaying 12 items.
- Multi-attacker protocol validation (Q540676) (← links)
- Distributed temporal logic for the analysis of security protocol models (Q549724) (← links)
- On the semantics of Alice \& Bob specifications of security protocols (Q860900) (← links)
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (Q880981) (← links)
- Termination of narrowing via termination of rewriting (Q969619) (← links)
- Compiling and securing cryptographic protocols (Q990127) (← links)
- On the symbolic reduction of processes with cryptographic functions. (Q1853612) (← links)
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete. (Q1874404) (← links)
- A formal semantics for protocol narrations (Q2463562) (← links)
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (Q2643568) (← links)
- Information based reasoning about security protocols (Q2841219) (← links)
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols (Q3184787) (← links)