ASPIER
From MaRDI portal
Cited in
(15)- Gaining trust by tracing security protocols
- Cryptographic Verification by Typing for a Sample Protocol Implementation
- Proved generation of implementations from computationally secure protocol specifications
- TulaFale
- AGVI
- NAXOS
- EasyCrypt
- CryptoVerif
- Spi2Java
- Security protocol verification: symbolic and computational models
- JavaSPI
- MJ
- ZKPDL
- On the security of TLS-DHE in the standard model
- Authenticated confidential channel establishment and the security of TLS-DHE
This page was built for software: ASPIER