Operational semantics and verification of security protocols.
From MaRDI portal
Data encryption (aspects in computer science) (68P25) Data structures (68P05) Introductory exposition (textbooks, tutorial papers, etc.) pertaining to computer science (68-01) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Network protocols (68M12) Theory of data (68P99)
Recommendations
- Comparative analysis of formal model checking tools for security protocol verification
- Formal verification: an imperative step in the design of security protocols
- Security protocol verification: symbolic and computational models
- Models and Proofs of Protocol Security: A Progress Report
- A coordination-based methodology for security protocol verification
Cited in
(24)- Update semantics of security protocols
- Using probabilistic automata for security protocols verification
- scientific article; zbMATH DE number 1947521 (Why is no real title available?)
- scientific article; zbMATH DE number 1860683 (Why is no real title available?)
- Formal verification: an imperative step in the design of security protocols
- Constructing Security Protocol Specifications for Web Services
- A formal semantics for protocol narrations
- Injective synchronisation: An extension of the authentication hierarchy
- Comparative analysis of formal model checking tools for security protocol verification
- Handbook of Formal Analysis and Verification in Cryptography
- Log your car: reliable maintenance services record
- A coordination-based methodology for security protocol verification
- On Establishing and Fixing a Parallel Session Attack in a Security Protocol
- Alice and Bob: reconciling formal models and implementation
- scientific article; zbMATH DE number 1941256 (Why is no real title available?)
- The vacuity of the open source security testing methodology manual
- A Survey of Practical Formal Methods for Security
- Formal Methods for Assuring Security of Protocols
- Security Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSA
- A framework for compositional verification of security protocols
- Simulation of security protocols based on scenarios of attacks
- Web security: Authentication protocols and their analysis
- ZB 2005: Formal Specification and Development in Z and B
- Cryptographic protocol. Security analysis based on trusted freshness.
This page was built for publication: Operational semantics and verification of security protocols.
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q610283)