YAPA
From MaRDI portal
Software:15278
swMATH2739MaRDI QIDQ15278FDOQ15278
Author name not available (Why is that?)
Cited In (16)
- Intruder deduction problem for locally stable theories with normal forms and inverses
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- Automated Verification of Equivalence Properties of Cryptographic Protocols
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Computing knowledge in security protocols under convergent equational theories
- Reducing equational theories for the decision of static equivalence
- Automating Security Analysis: Symbolic Equivalence of Constraint Systems
- The Applied Pi Calculus
- Compiling and securing cryptographic protocols
- Title not available (Why is that?)
- Model Checking Security Protocols
- Stateful applied pi calculus: observational equivalence and labelled bisimilarity
- Computing knowledge in equational extensions of subterm convergent theories
- Automated Verification of Equivalence Properties of Cryptographic Protocols
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols
- Deciding knowledge in security protocols under some e-voting theories
This page was built for software: YAPA