swMATH3172MaRDI QIDQ15706FDOQ15706
Author name not available (Why is that?)
Official website: http://www.avispa-project.org/
Cited In (only showing first 100 items - show all)
- Deciding equivalence-based properties using constraint solving
- Intruder deduction problem for locally stable theories with normal forms and inverses
- Foundations of Software Science and Computation Structures
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- Computationally Sound Symbolic Secrecy in the Presence of Hash Functions
- LTL model checking for security protocols
- Multi-attacker protocol validation
- Formal analysis of security protocols for wireless sensor networks
- A semantics for behavior trees using CSP with specification commands
- Automatic verification of security protocols in the symbolic model: the verifier ProVerif
- A Protocol for Secure Public Instant Messaging
- Distributed temporal logic for the analysis of security protocol models
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- On the semantics of Alice \& Bob specifications of security protocols
- YAPA: A Generic Tool for Computing Intruder Knowledge
- Computing knowledge in security protocols under convergent equational theories
- Safely composing security protocols
- Injective synchronisation: An extension of the authentication hierarchy
- Handling Algebraic Properties in Automatic Analysis of Security Protocols
- Intruder deduction for the equational theory of abelian groups with distributive encryption
- Simulation based security in the applied pi calculus
- Completeness of tree automata completion
- Modeling and verifying ad hoc routing protocols
- From One Session to Many: Dynamic Tags for Security Protocols
- Multicast receiver access control by IGMP-AC
- A procedure for deciding symbolic equivalence between sets of constraint systems
- Towards an Automatic Analysis of Web Service Security
- The CL-Atse Protocol Analyser
- Automatic verification of temporal-epistemic properties of cryptographic protocols
- HERMES
- TulaFale
- FAST
- CMQV+
- Casper
- ProVerif
- SeVe
- Timbuk
- XMPP
- OFMC
- SATMC
- scyther
- EasyCrypt
- Maude-NPA
- NRL
- Cryptyc
- ConfiChair
- RiTHM
- Certifying a Tree Automata Completion Checker
- ESAP: efficient and secure authentication protocol for roaming user in mobile communication networks
- A reduced semantics for deciding trace equivalence
- Automated verification of equivalence properties of cryptographic protocols
- Akiss
- Apte
- SPEC
- Plutus
- scyther-proof
- TAMARIN
- CoSP
- iperf
- AODV
- CPSA
- Deciding Key Cycles for Security Protocols
- Safely Composing Security Protocols
- Helios
- A decidable class of security protocols for both reachability and equivalence properties
- A framework for compositional verification of security protocols
- openCryptoki
- Modelling and checking timed authentication of security protocols
- Computational soundness of symbolic analysis for protocols using hash functions
- Explicit randomness is not necessary when modeling probabilistic encryption
- Protocol composition logic (PCL)
- Validating Security Protocols under the General Attacker
- Automated type-based analysis of injective agreement in the presence of compromised principals
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Termination criteria for tree automata completion
- A Formal Analysis of Complex Type Flaw Attacks on Security Protocols
- Verification of the TESLA protocol in MCMAS-X
- SeVe: automatic tool for verification of security protocols
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
- Deciding knowledge in security protocols under some e-voting theories
- YAPA: a generic tool for computing intruder knowledge
- Breaking and fixing public-key Kerberos
- Cryptographic Protocol Composition via the Authentication Tests
- Modeling and Analysis of Security Protocols Using Role Based Specifications and Petri Nets
- Tree automata for detecting attacks on protocols with algebraic cryptographic primitives
- Feasible Trace Reconstruction for Rewriting Approximations
- Deciding security for protocols with recursive tests
- Ephemeral-secret-leakage secure ID-based three-party authenticated key agreement protocol for mobile distributed computing environments
- Cryptographically sound security proofs for basic and public-key Kerberos
- Alice and Bob meet equational theories
- Designing and Verifying Core Protocols for Location Privacy
- Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later
- SAT-Based Verification of Security Protocols Via Translation to Networks of Automata
- A Complete Quantified Epistemic Logic for Reasoning about Message Passing Systems
- On Communication Models When Verifying Equivalence Properties
- The Applied Pi Calculus
- An introduction to security API analysis
- On the relationships between models in protocol verification
- Formalization in PVS of balancing properties necessary for proving security of the Dolev-Yao cascade protocol model
- Dynamic tags for security protocols
This page was built for software: AVISPA