scyther
From MaRDI portal
Software:21450
swMATH9467MaRDI QIDQ21450FDOQ21450
Author name not available (Why is that?)
Cited In (14)
- Deciding equivalence-based properties using constraint solving
- Distributed temporal logic for the analysis of security protocol models
- Computer-Aided Security Proofs for the Working Cryptographer
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- Log your car: reliable maintenance services record
- A procedure for deciding symbolic equivalence between sets of constraint systems
- A reduced semantics for deciding trace equivalence
- Automated verification of equivalence properties of cryptographic protocols
- Causality, behavioural equivalences, and the security of cyberphysical systems
- Formal analysis and offline monitoring of electronic exams
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Designing reliable distributed systems. A formal methods approach based on executable modeling in Maude
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- Comparing State Spaces in Automatic Security Protocol Analysis
This page was built for software: scyther