scyther
From MaRDI portal
Software:21450
swMATH9467MaRDI QIDQ21450FDOQ21450
Author name not available (Why is that?)
Cited In (14)
- Deciding equivalence-based properties using constraint solving
- Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems
- Distributed temporal logic for the analysis of security protocol models
- Title not available (Why is that?)
- Computer-Aided Security Proofs for the Working Cryptographer
- LWDSA: light-weight digital signature algorithm for wireless sensor networks
- A procedure for deciding symbolic equivalence between sets of constraint systems
- Log Your Car: Reliable Maintenance Services Record
- Designing reliable distributed systems. A formal methods approach based on executable modeling in Maude
- Formal analysis and offline monitoring of electronic exams
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Automated Verification of Equivalence Properties of Cryptographic Protocols
- Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
- Comparing State Spaces in Automatic Security Protocol Analysis
This page was built for software: scyther