ProVerif
From MaRDI portal
Software:18650
No author found.
Related Items (43)
Relating Process Languages for Security and Communication Correctness (Extended Abstract) ⋮ Unnamed Item ⋮ Security Protocol Verification: Symbolic and Computational Models ⋮ Analysing Routing Protocols: Four Nodes Topologies Are Sufficient ⋮ Verification of Security Protocols with Lists: From Length One to Unbounded Length ⋮ Reduction of Equational Theories for Verification of Trace Equivalence: Re-encryption, Associativity and Commutativity ⋮ Model Checking Security Protocols ⋮ The Applied Pi Calculus ⋮ Implementing and measuring \textsf{KEMTLS} ⋮ A Program Logic for Verifying Secure Routing Protocols ⋮ Alice and Bob: Reconciling Formal Models and Implementation ⋮ Formal verification of fair exchange based on Bitcoin smart contracts ⋮ Formal analysis and offline monitoring of electronic exams ⋮ PIC2LNT: Model Transformation for Model Checking an Applied Pi-Calculus ⋮ Proving More Observational Equivalences with ProVerif ⋮ Formal Verification of e-Auction Protocols ⋮ Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types ⋮ Alice and Bob Meet Equational Theories ⋮ Universally composable symbolic security analysis ⋮ \textsf{CaPiTo}: Protocol stacks for services ⋮ Theory of Cryptography ⋮ Computing knowledge in equational extensions of subterm convergent theories ⋮ Formal Analysis of a TTP-Free Blacklistable Anonymous Credentials System ⋮ Automated type-based analysis of injective agreement in the presence of compromised principals ⋮ Automated Verification of Dynamic Root of Trust Protocols ⋮ Security protocols analysis including various time parameters ⋮ Formal methods for web security ⋮ Automated verification of selected equivalences for security protocols ⋮ SeVe: automatic tool for verification of security protocols ⋮ Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach ⋮ Abstractions of non-interference security: probabilistic versus possibilistic ⋮ DABSTERS: a privacy preserving e-voting protocol for permissioned blockchain ⋮ Combining proverif and automated theorem provers for security protocol verification ⋮ YAPA: A Generic Tool for Computing Intruder Knowledge ⋮ Processes against tests: on defining contextual equivalences ⋮ Programming Languages and Systems ⋮ Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif ⋮ Gaining trust by tracing security protocols ⋮ Privacy-preserving authenticated key exchange for constrained devices ⋮ YAPA ⋮ The 10th IJCAR automated theorem proving system competition – CASC-J10 ⋮ Formalizing provable anonymity in Isabelle/HOL ⋮ Terminating non-disjoint combined unification
This page was built for software: ProVerif