Automated Verification of Dynamic Root of Trust Protocols
From MaRDI portal
Publication:3304809
DOI10.1007/978-3-662-54455-6_5zbMath1444.68037arXiv1701.08676OpenAlexW3124484319MaRDI QIDQ3304809
Sergiu Bursuc, Shiwei Xu, Christian Johansen
Publication date: 3 August 2020
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1701.08676
Cryptography (94A60) Specification and verification (program logics, model checking, etc.) (68Q60) Computer security (68M25)
Uses Software
Cites Work
- Principles of security and trust. First international conference, POST 2012, held as part of the European joint conferences on theory and practice of software, ETAPS 2012, Tallinn, Estonia, March 24 -- April 1, 2012. Proceedings
- Analysing Routing Protocols: Four Nodes Topologies Are Sufficient
- Parametric Verification of Address Space Separation
- Verification of Security Protocols with Lists: From Length One to Unbounded Length
- Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity
- Compiling Information-Flow Security to Minimal Trusted Computing Bases
- Mobile values, new names, and secure communication
- Unnamed Item