AVISPA
From MaRDI portal
Cited in
(only showing first 100 items - show all)- Validating Security Protocols under the General Attacker
- Automated type-based analysis of injective agreement in the presence of compromised principals
- Formal analysis and offline monitoring of electronic exams
- Computing knowledge in equational extensions of subterm convergent theories
- Termination criteria for tree automata completion
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Sender access and data distribution control for inter-domain multicast groups
- Combining proverif and automated theorem provers for security protocol verification
- A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols
- SeVe: automatic tool for verification of security protocols
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
- Verification of the TESLA protocol in MCMAS-X
- Deciding knowledge in security protocols under some e-voting theories
- YAPA: a generic tool for computing intruder knowledge
- Functional Correctness Proofs of Encryption Algorithms
- Security protocols analysis including various time parameters
- Breaking and fixing public-key Kerberos
- Propositional Tree Automata
- Cryptographic Protocol Composition via the Authentication Tests
- Comparing State Spaces in Automatic Security Protocol Analysis
- Deciding equivalence-based properties using constraint solving
- Intruder deduction problem for locally stable theories with normal forms and inverses
- Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- Foundations of Software Science and Computation Structures
- Feasible Trace Reconstruction for Rewriting Approximations
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
- Multi-attacker protocol validation
- A semantics for behavior trees using CSP with specification commands
- Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments
- Deciding security for protocols with recursive tests
- Formal analysis of security protocols for wireless sensor networks
- Alice and Bob meet equational theories
- LTL model checking for security protocols
- Cryptographically sound security proofs for basic and public-key Kerberos
- Automatic verification of security protocols in the symbolic model: the verifier ProVerif
- Distributed temporal logic for the analysis of security protocol models
- A Protocol for Secure Public Instant Messaging
- Designing and Verifying Core Protocols for Location Privacy
- Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
- On the semantics of Alice \& Bob specifications of security protocols
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Computing knowledge in security protocols under convergent equational theories
- YAPA: A Generic Tool for Computing Intruder Knowledge
- Safely composing security protocols
- SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
- A Complete Quantified Epistemic Logic for Reasoning about Message Passing Systems
- Injective synchronisation: An extension of the authentication hierarchy
- On Communication Models When Verifying Equivalence Properties
- Intruder deduction for the equational theory of abelian groups with distributive encryption
- Handling Algebraic Properties in Automatic Analysis of Security Protocols
- The Applied Pi Calculus
- An introduction to security API analysis
- Simulation based security in the applied pi calculus
- Completeness of tree automata completion
- On the relationships between models in protocol verification
- Modeling and verifying ad hoc routing protocols
- HERMES
- TulaFale
- LDYIS
- VerICS
- TAPS
- MCMAS-X
- SPINS
- HOL/SPIN
- NAXOS
- YAPA
- CASPA_
- FAST
- CMQV+
- Casper
- ProVerif
- SeVe
- Timbuk
- XMPP
- OFMC
- SATMC
- scyther
- EasyCrypt
- Maude-NPA
- NRL
- Cryptyc
- ConfiChair
- RiTHM
- Akiss
- Apte
- SPEC
- Plutus
- scyther-proof
- TAMARIN
- CoSP
- iperf
- AODV
- CPSA
- Helios
- openCryptoki
- Multicast receiver access control by IGMP-AC
- A procedure for deciding symbolic equivalence between sets of constraint systems
This page was built for software: AVISPA