Handling Algebraic Properties in Automatic Analysis of Security Protocols
From MaRDI portal
Publication:3525147
Recommendations
- Algebraic Intruder Deductions
- Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
- scientific article; zbMATH DE number 1927581
- Symbolic protocol analysis for monoidal equational theories
Cited in
(8)- Towards an Efficient Implementation of Tree Automata Completion
- A theoretical limit for safety verification techniques with regular fix-point computations
- Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
- scientific article; zbMATH DE number 7211469 (Why is no real title available?)
- Handling left-quadratic rules when completing tree automata
- Protocol Security and Algebraic Properties: Decision Results for a Bounded Number of Sessions
- Symbol different term rewrite systems
- Algebraic Intruder Deductions
This page was built for publication: Handling Algebraic Properties in Automatic Analysis of Security Protocols
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3525147)