Theory and Applications of Satisfiability Testing
From MaRDI portal
Publication:5325866
Recommendations
- scientific article; zbMATH DE number 1973985
- An optimized intruder model for SAT-based model-checking of security protocols
- SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
- A satisfiability-based approach to abstraction refinement in model checking
- Information based reasoning about security protocols
Cited in
(10)- Safe abstractions of data encodings in formal security protocol models
- Logics in Artificial Intelligence
- GridSAT: Design and implementation of a computational grid application
- Information based reasoning about security protocols
- Ordering from Satan's menu: a survey of requirements specification for formal analysis of cryptographic protocols
- SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- scientific article; zbMATH DE number 1973985 (Why is no real title available?)
- An optimized intruder model for SAT-based model-checking of security protocols
- Logic Programming
This page was built for publication: Theory and Applications of Satisfiability Testing
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5325866)