Cited in
(55)- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically
- Twenty years of rewriting logic
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties
- Automatic verification of security protocols in the symbolic model: the verifier ProVerif
- Distributed temporal logic for the analysis of security protocol models
- Refinement-preserving plug-in components
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols
- Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types
- Rule-based static analysis of network protocol implementations
- Narrowing and rewriting logic: from foundations to applications
- ASSET
- TAPS
- YAPA
- AVISPA
- ECCE
- MWB
- Casper
- ProVerif
- Timbuk
- 2OBJ
- csp2B
- PAGODA
- Pict
- OFMC
- SATMC
- scyther
- K-Maude
- MTT
- CARIBOO
- TeMP
- Maude-NPA
- vlogsl
- MMC
- SymPLFIED
- Plutus
- KOOL
- Hierarchical combination of intruder theories
- Interrogator
- Relating state-based and process-based concurrency through linear logic (full-version)
- A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
- Bounding messages for free in security protocols -- extension to various security properties
- Finite-state analysis of two contract signing protocols
- State space reduction in the Maude-NRL protocol analyzer
- Protocol composition logic (PCL)
- Model Checking Security Protocols
- Attacking fair-exchange protocols: parallel models vs. trace models
- A new logic for electronic commerce protocols
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols
- Complete symbolic reachability analysis using back-and-forth narrowing
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols
- Web security: Authentication protocols and their analysis
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures
- Temporal logics of knowledge and their applications in security
- Relating state-based and process-based concurrency through linear logic
- scientific article; zbMATH DE number 1863379 (Why is no real title available?)
This page was built for software: NRL