NRL
From MaRDI portal
Software:24089
swMATH12158MaRDI QIDQ24089FDOQ24089
Author name not available (Why is that?)
Cited In (28)
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically
- Twenty years of rewriting logic
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- Distributed temporal logic for the analysis of security protocol models
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types
- Rule-based static analysis of network protocol implementations
- Narrowing and rewriting logic: from foundations to applications
- Hierarchical combination of intruder theories
- Relating State-Based and Process-Based Concurrency through Linear Logic
- Relating state-based and process-based concurrency through linear logic (full-version)
- A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
- Finite-state analysis of two contract signing protocols
- Bounding messages for free in security protocols -- extension to various security properties
- State space reduction in the Maude-NRL protocol analyzer
- Protocol composition logic (PCL)
- Model Checking Security Protocols
- Attacking fair-exchange protocols: parallel models vs. trace models
- A new logic for electronic commerce protocols
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Web security: Authentication protocols and their analysis
- Complete symbolic reachability analysis using back-and-forth narrowing
- Refinement-Preserving Plug-In Components
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
- Temporal logics of knowledge and their applications in security
- Title not available (Why is that?)
This page was built for software: NRL