Pages that link to "Item:Q3128627"
From MaRDI portal
The following pages link to The NRL Protocol Analyzer: An Overview (Q3128627):
Displayed 25 items.
- NRL (Q24089) (← links)
- Distributed temporal logic for the analysis of security protocol models (Q549724) (← links)
- Relating state-based and process-based concurrency through linear logic (full-version) (Q731895) (← links)
- Complete symbolic reachability analysis using back-and-forth narrowing (Q860885) (← links)
- A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties (Q860906) (← links)
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (Q880981) (← links)
- Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types (Q880987) (← links)
- Finite-state analysis of two contract signing protocols (Q1603658) (← links)
- Analysis of security protocols as open systems (Q1853583) (← links)
- A new logic for electronic commerce protocols (Q1853749) (← links)
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete. (Q1874404) (← links)
- Twenty years of rewriting logic (Q1931904) (← links)
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (Q2268100) (← links)
- Rule-based static analysis of network protocol implementations (Q2482438) (← links)
- Hierarchical combination of intruder theories (Q2482450) (← links)
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (Q2484410) (← links)
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (Q2643568) (← links)
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties (Q3184784) (← links)
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols (Q3184787) (← links)
- Challenges in the Automated Verification of Security Protocols (Q3541719) (← links)
- LTL model checking for security protocols (Q5188173) (← links)
- Automatic verification of temporal-epistemic properties of cryptographic protocols (Q5188176) (← links)
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols (Q5458828) (← links)
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems (Q5747780) (← links)
- Web security: Authentication protocols and their analysis (Q5945162) (← links)