Verifying security protocols with PVS: widening the rank function approach
From MaRDI portal
Publication:2484411
Recommendations
Cites work
Cited in
(6)- PVS embedding of cCSP semantic models and their relationship
- Verifying part of the ACCESS.bus protocol using PVS
- Communicating Sequential Processes. The First 25 Years
- Formalization in PVS of balancing properties necessary for proving security of the Dolev-Yao cascade protocol model
- scientific article; zbMATH DE number 1860614 (Why is no real title available?)
- SPVT: an efficient verification tool for security protocols
This page was built for publication: Verifying security protocols with PVS: widening the rank function approach
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2484411)