scyther
From MaRDI portal
Scyther
Cited in
(33)- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- A reduced semantics for deciding trace equivalence
- Deciding equivalence-based properties using constraint solving
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Designing reliable distributed systems. A formal methods approach based on executable modeling in Maude
- Distributed temporal logic for the analysis of security protocol models
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- Formal analysis and offline monitoring of electronic exams
- Automated verification of equivalence properties of cryptographic protocols
- Comparing State Spaces in Automatic Security Protocol Analysis
- HERMES
- YAPA
- AVISPA
- FAST
- CMQV+
- Casper
- ProVerif
- OFMC
- SATMC
- Maude-NPA
- NRL
- ConfiChair
- RiTHM
- Akiss
- Apte
- SPEC
- TAMARIN
- CPSA
- Helios
- A procedure for deciding symbolic equivalence between sets of constraint systems
- Log your car: reliable maintenance services record
- Causality, behavioural equivalences, and the security of cyberphysical systems
- Computer-Aided Security Proofs for the Working Cryptographer
This page was built for software: scyther