OFMC
From MaRDI portal
Software:21449
No author found.
Related Items (25)
Formal Verification of a Key Establishment Protocol for EPC Gen2 RFID Systems: Work in Progress ⋮ Model Checking Security Protocols ⋮ On the Automated Correction of Protocols with Improper Message Encoding ⋮ Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties ⋮ The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ On the semantics of Alice \& Bob specifications of security protocols ⋮ A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties ⋮ Computer Aided Verification ⋮ From Security Protocols to Pushdown Automata ⋮ Computational Soundness of Symbolic Zero-Knowledge Proofs: Weaker Assumptions and Mechanized Verification ⋮ Intruder deduction for the equational theory of abelian groups with distributive encryption ⋮ Verifying a signature architecture: a comparative case study ⋮ On-the-Fly Model Checking of Fair Non-repudiation Protocols ⋮ \textsf{CaPiTo}: Protocol stacks for services ⋮ State space reduction in the Maude-NRL protocol analyzer ⋮ Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol ⋮ Computing knowledge in equational extensions of subterm convergent theories ⋮ Protocol insecurity with a finite number of sessions and a cost-sensitive guessing intruder is NP-complete ⋮ Efficient representation of the attacker's knowledge in cryptographic protocols analysis ⋮ Automated type-based analysis of injective agreement in the presence of compromised principals ⋮ Security protocols analysis including various time parameters ⋮ Distributed temporal logic for the analysis of security protocol models ⋮ On Establishing and Fixing a Parallel Session Attack in a Security Protocol ⋮ A Formal Language for Cryptographic Pseudocode ⋮ Computationally Sound Abstraction and Verification of Secure Multi-Party Computations
This page was built for software: OFMC