POR for security protocol equivalences. Beyond action-determinism
From MaRDI portal
Publication:2167736
DOI10.1007/978-3-319-99073-6_19zbMath1496.68055arXiv1804.03650OpenAlexW2797441962MaRDI QIDQ2167736
Stéphanie Delaune, Lucca Hirschi, David Baelde
Publication date: 25 August 2022
Full work available at URL: https://arxiv.org/abs/1804.03650
Related Items
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Deciding equivalence-based properties using constraint solving
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
- Private authentication
- Partial-order methods for the verification of concurrent systems. An approach to the state-explosion problem
- The Hitchhiker's guide to decidability and complexity of equivalence properties in security protocols
- POR for security protocol equivalences. Beyond action-determinism
- Automated Verification of Equivalence Properties of Cryptographic Protocols
- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
- Mobile values, new names, and secure communication
- Dynamic partial-order reduction for model checking software
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Partial Order Reduction for Security Protocols
- Optimal dynamic partial order reduction
- Computer Aided Verification
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems