NRL

From MaRDI portal
Software:24089



swMATH12158MaRDI QIDQ24089


No author found.





Related Items (28)

Model Checking Security ProtocolsMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesThe Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsComplete symbolic reachability analysis using back-and-forth narrowingA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsRepresenting the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent typesTwenty years of rewriting logicState space reduction in the Maude-NRL protocol analyzerBounding messages for free in security protocols -- extension to various security propertiesUnnamed ItemRelating State-Based and Process-Based Concurrency through Linear LogicRule-based static analysis of network protocol implementationsHierarchical combination of intruder theoriesAbstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automaticallyRefinement-Preserving Plug-In ComponentsDistributed temporal logic for the analysis of security protocol modelsSymbolic protocol analysis in the union of disjoint intruder theories: combining decision proceduresWeb security: Authentication protocols and their analysisRelating state-based and process-based concurrency through linear logic (full-version)Attacking Fair-Exchange ProtocolsAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifA new logic for electronic commerce protocolsProtocol Composition Logic (PCL)Temporal Logics of Knowledge and their Applications in SecurityFinite-state analysis of two contract signing protocolsNarrowing and Rewriting Logic: from Foundations to Applications


This page was built for software: NRL