ProVerif

From MaRDI portal
Software:18650



swMATH6558MaRDI QIDQ18650


No author found.





Related Items (43)

Relating Process Languages for Security and Communication Correctness (Extended Abstract)Unnamed ItemSecurity Protocol Verification: Symbolic and Computational ModelsAnalysing Routing Protocols: Four Nodes Topologies Are SufficientVerification of Security Protocols with Lists: From Length One to Unbounded LengthReduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and CommutativityModel Checking Security ProtocolsThe Applied Pi CalculusImplementing and measuring \textsf{KEMTLS}A Program Logic for Verifying Secure Routing ProtocolsAlice and Bob: Reconciling Formal Models and ImplementationFormal verification of fair exchange based on Bitcoin smart contractsFormal analysis and offline monitoring of electronic examsPIC2LNT: Model Transformation for Model Checking an Applied Pi-CalculusProving More Observational Equivalences with ProVerifFormal Verification of e-Auction ProtocolsRepresenting the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent typesAlice and Bob Meet Equational TheoriesUniversally composable symbolic security analysis\textsf{CaPiTo}: Protocol stacks for servicesTheory of CryptographyComputing knowledge in equational extensions of subterm convergent theoriesFormal Analysis of a TTP-Free Blacklistable Anonymous Credentials SystemAutomated type-based analysis of injective agreement in the presence of compromised principalsAutomated Verification of Dynamic Root of Trust ProtocolsSecurity protocols analysis including various time parametersFormal methods for web securityAutomated verification of selected equivalences for security protocolsSeVe: automatic tool for verification of security protocolsReducing protocol analysis with XOR to the XOR-free case in the Horn theory based approachAbstractions of non-interference security: probabilistic versus possibilisticDABSTERS: a privacy preserving e-voting protocol for permissioned blockchainCombining proverif and automated theorem provers for security protocol verificationYAPA: A Generic Tool for Computing Intruder KnowledgeProcesses against tests: on defining contextual equivalencesProgramming Languages and SystemsAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifGaining trust by tracing security protocolsPrivacy-preserving authenticated key exchange for constrained devicesYAPAThe 10th IJCAR automated theorem proving system competition – CASC-J10Formalizing provable anonymity in Isabelle/HOLTerminating non-disjoint combined unification


This page was built for software: ProVerif