Computing knowledge in security protocols under convergent equational theories
From MaRDI portal
Recommendations
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Automata, Languages and Programming
- Deciding knowledge in security protocols under equational theories
- Decidability and combination results for two notions of knowledge in security protocols
- Combining Algorithms for Deciding Knowledge in Security Protocols
Cites work
- scientific article; zbMATH DE number 1149900 (Why is no real title available?)
- Analysing password protocol security against off-line dictionary attacks
- Automated verification of selected equivalences for security protocols
- Combining Algorithms for Deciding Knowledge in Security Protocols
- Computer Aided Verification
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Deciding Knowledge in Security Protocols for Monoidal Equational Theories
- Deciding knowledge in security protocols under equational theories
- Deciding knowledge in security protocols under some e-voting theories
- Intruder deduction for the equational theory of abelian groups with distributive encryption
- Intruders with Caps
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- Mobile values, new names, and secure communication
- Programming Languages and Systems
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Verifying privacy-type properties of electronic voting protocols: a taster
- YAPA: A Generic Tool for Computing Intruder Knowledge
Cited in
(17)- Deciding knowledge in security protocols under equational theories
- DeepSec: deciding equivalence properties for security protocols -- improved theory and practice
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Decidability and combination results for two notions of knowledge in security protocols
- YAPA: A Generic Tool for Computing Intruder Knowledge
- Terminating non-disjoint combined unification
- Analysing privacy-type properties in cryptographic protocols (invited talk)
- Notions of knowledge in combinations of theories sharing constructors
- Probability timed automata for investigating communication processes
- Automated verification of equivalence properties of cryptographic protocols
- scientific article; zbMATH DE number 1534512 (Why is no real title available?)
- Computing knowledge in equational extensions of subterm convergent theories
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
- Deciding knowledge in security protocols under some e-voting theories
- Automata, Languages and Programming
- YAPA: a generic tool for computing intruder knowledge
- Combining Algorithms for Deciding Knowledge in Security Protocols
This page was built for publication: Computing knowledge in security protocols under convergent equational theories
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q437033)