Maude-NPA

From MaRDI portal
Software:24090



swMATH12159MaRDI QIDQ24090


No author found.





Related Items (31)

Model Checking Security ProtocolsSymbolic Protocol Analysis with Disequality Constraints Modulo Equational TheoriesMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesSentence-normalized conditional narrowing modulo in rewriting logic and MaudeOptimization of rewrite theories by equational partial evaluationJosé Meseguer: Scientist and Friend ExtraordinaireSentence-Normalized Conditional Narrowing Modulo in Rewriting Logic and MaudeTwo Decades of MaudeTwenty years of rewriting logicA formalisation of nominal \(\alpha\)-equivalence with A, C, and AC function symbolsUnnamed ItemUnnamed ItemUnnamed ItemEfficient general AGH-unificationBounded ACh unificationComputing knowledge in equational extensions of subterm convergent theoriesBeyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsA formalisation of nominal \(\alpha\)-equivalence with A and AC function symbolsIntruder deduction problem for locally stable theories with normal forms and inversesOrder-sorted Equational Unification RevisitedTree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic PrimitivesVariant Narrowing and Equational UnificationEfficient General Unification for XOR with HomomorphismGeneralized rewrite theories, coherence completion, and symbolic methodsProgramming and symbolic computation in MaudeAutomated Verification of Equivalence Properties of Cryptographic ProtocolsBuilt-in Variant Generation and Unification, and Their Applications in Maude 2.7Combining proverif and automated theorem provers for security protocol verificationEquational unification and matching, and symbolic reachability analysis in Maude 3.2 (system description)Symbolic computation in Maude: some tapasTerminating non-disjoint combined unification


This page was built for software: Maude-NPA