scientific article; zbMATH DE number 1759624
From MaRDI portal
Publication:4536615
Recommendations
- On the symbolic reduction of processes with cryptographic functions.
- On the symbolic reduction of processes with cryptographic functions
- scientific article; zbMATH DE number 1754628
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or
- Three systems for cryptographic protocol analysis
Cited in
(42)- Deciding security properties for cryptographic protocols. application to key cycles
- Probabilistic and nondeterministic aspects of anonymity
- Bounded memory protocols
- scientific article; zbMATH DE number 4053510 (Why is no real title available?)
- Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete
- A method for symbolic analysis of security protocols
- A Proof Theoretic Analysis of Intruder Theories
- Decidability issues for extended ping-pong protocols
- Decision procedures for the security of protocols with probabilistic encryption against offline dictionary attacks
- scientific article; zbMATH DE number 4082597 (Why is no real title available?)
- On the symbolic reduction of processes with cryptographic functions.
- An NP decision procedure for protocol insecurity with XOR
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- A symbolic decision procedure for cryptographic protocols with time stamps
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- Deciding framed bisimilarity
- Simulation relations for alternating Büchi automata
- A static analysis of cryptographic processes: the denotational approach
- Tree automata with one memory set constraints and cryptographic protocols
- Verification, Model Checking, and Abstract Interpretation
- Bounded memory Dolev-Yao adversaries in collaborative systems
- The coinductive approach to verifying cryptographic protocols.
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- State space reduction in the Maude-NRL protocol analyzer
- Foundations of Software Science and Computation Structures
- Deciding Key Cycles for Security Protocols
- scientific article; zbMATH DE number 1956588 (Why is no real title available?)
- Probabilistic Termination and Composability of Cryptographic Protocols
- The practice of cryptographic protocol verification
- On the symbolic reduction of processes with cryptographic functions
- CONCUR 2004 - Concurrency Theory
- Computing knowledge in equational extensions of subterm convergent theories
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Efficient representation of the attacker's knowledge in cryptographic protocols analysis
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Protocol Verification Via Rigid/Flexible Resolution
- Analysis of security protocols as open systems
- Satisfiability of general intruder constraints with and without a set constructor
- Symbolic Protocol Analysis in Presence of a Homomorphism Operator and Exclusive Or
- Finite Models in FOL-Based Crypto-Protocol Verification
- scientific article; zbMATH DE number 1956510 (Why is no real title available?)
- scientific article; zbMATH DE number 1927582 (Why is no real title available?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4536615)