Casper
From MaRDI portal
swMATH6559MaRDI QIDQ18651FDOQ18651
scientific article; zbMATH DE number Author name (Why is no real title available?)
Official website: http://www.cs.ox.ac.uk/gavin.lowe/Security/Casper/
(only showing first 100 items - show all)
- Alice and Bob: reconciling formal models and implementation
- scientific article; zbMATH DE number 1487485 (Why is no real title available?)
- scientific article; zbMATH DE number 1956589 (Why is no real title available?)
- Relating two standard notions of secrecy
- scientific article; zbMATH DE number 1973985 (Why is no real title available?)
- ZB 2005: Formal Specification and Development in Z and B
- Trust Management
- Alice and Bob meet equational theories
- Modeling and verifying time sensitive security protocols with constraints
- Mathematical Foundations of Computer Science 2003
- Tools and Algorithms for the Construction and Analysis of Systems
- Comparative analysis of formal model checking tools for security protocol verification
- scientific article; zbMATH DE number 1765658 (Why is no real title available?)
- Comparing State Spaces in Automatic Security Protocol Analysis
- Constraints Solution for Time Sensitive Security Protocols
- A formal semantics for protocol narrations
- scientific article; zbMATH DE number 2090117 (Why is no real title available?)
- Model Checking Security Protocols
- SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
- Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
- Key compromise, strand spaces, and the authentication tests
- Verifying security protocols modelled by networks of automata
- Application-binding protocol in the user centric smart card ownership model
- Log your car: reliable maintenance services record
- Integrating Verification, Testing, and Learning for Cryptographic Protocols
- EXPLOITING SYMMETRIES FOR TESTING EQUIVALENCE VERIFICATION IN THE SPI CALCULUS
- Formal Methods for Assuring Security of Protocols
- scientific article; zbMATH DE number 1926618 (Why is no real title available?)
- scientific article; zbMATH DE number 1844577 (Why is no real title available?)
- The coinductive approach to verifying cryptographic protocols.
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis
- Modelling and checking timed authentication of security protocols
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- Algebraic Intruder Deductions
- Specification of communicating processes: temporal logic versus refusals-based refinement
- Compiling and securing cryptographic protocols
- Secure Systems Development with UML
- Probabilistic anonymity via coalgebraic simulations
- On global types and multi-party sessions
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- SAT-solving in CSP trace refinement
- Timed automata based model checking of timed security protocols
- Distributed temporal logic for the analysis of security protocol models
- Cryptographic Protocol Composition via the Authentication Tests
- Explicit randomness is not necessary when modeling probabilistic encryption
- SeVe: automatic tool for verification of security protocols
- Automatic verification of temporal-epistemic properties of cryptographic protocols
- Provably repairing the ISO/IEC 9798 standard for entity authentication
- Relating Strand Spaces and Distributed Temporal Logic for Security Protocol Analysis
- scientific article; zbMATH DE number 2087629 (Why is no real title available?)
- On the semantics of Alice \& Bob specifications of security protocols
- Safely composing security protocols
- Operational semantics and verification of security protocols.
- Pattern-matching spi-calculus
- scientific article; zbMATH DE number 1739897 (Why is no real title available?)
- scientific article; zbMATH DE number 1696763 (Why is no real title available?)
- scientific article; zbMATH DE number 2084804 (Why is no real title available?)
- scientific article; zbMATH DE number 1962759 (Why is no real title available?)
- HERMES
- TulaFale
- Rapide
- LDYIS
- VerICS
- TAPS
- MCMAS-X
- SPINS
- YAPA
- AVISPA
- CCSL
- JACK
- CZT
- ProVerif
- SeVe
- Injective synchronisation: An extension of the authentication hierarchy
- A process algebraic approach to software architecture design
- scientific article; zbMATH DE number 1903362 (Why is no real title available?)
- Alcoa
- OFMC
- SATMC
- scyther
- FDR2
- NRL
- Cryptyc
- PAT
- ProBE
- FDR explorer
- Foundations of Software Science and Computation Structures
- scyther-proof
- AnBx
- TGV
- Communicating Sequential Processes. The First 25 Years
- scientific article; zbMATH DE number 1538051 (Why is no real title available?)
- Interrogator
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Authentication tests and the structure of bundles.
- Formal correctness of security protocols.
- Probabilistic and nondeterministic aspects of anonymity
- Maude versus Haskell: An experimental comparison in security protocol analysis
- Theory and Applications of Satisfiability Testing
This page was built for software: Casper