The following pages link to NRL (Q24089):
Displaying 28 items.
- State space reduction in the Maude-NRL protocol analyzer (Q462493) (← links)
- Bounding messages for free in security protocols -- extension to various security properties (Q476179) (← links)
- Distributed temporal logic for the analysis of security protocol models (Q549724) (← links)
- Relating state-based and process-based concurrency through linear logic (full-version) (Q731895) (← links)
- Complete symbolic reachability analysis using back-and-forth narrowing (Q860885) (← links)
- A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties (Q860906) (← links)
- Symbolic reachability analysis using narrowing and its application to verification of cryptographic protocols (Q880981) (← links)
- Representing the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent types (Q880987) (← links)
- Finite-state analysis of two contract signing protocols (Q1603658) (← links)
- A new logic for electronic commerce protocols (Q1853749) (← links)
- Twenty years of rewriting logic (Q1931904) (← links)
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (Q2268100) (← links)
- Rule-based static analysis of network protocol implementations (Q2482438) (← links)
- Hierarchical combination of intruder theories (Q2482450) (← links)
- Abstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automatically (Q2484410) (← links)
- Automatic verification of secrecy properties for linear logic specifications of cryptographic protocols (Q2643568) (← links)
- Attacking Fair-Exchange Protocols (Q2841217) (← links)
- Protocol Composition Logic (PCL) (Q2864155) (← links)
- Temporal Logics of Knowledge and their Applications in Security (Q2866724) (← links)
- Narrowing and Rewriting Logic: from Foundations to Applications (Q2873786) (← links)
- Model Checking Security Protocols (Q3176380) (← links)
- Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties (Q3184784) (← links)
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols (Q3184787) (← links)
- (Q4790653) (← links)
- Relating State-Based and Process-Based Concurrency through Linear Logic (Q4917995) (← links)
- Refinement-Preserving Plug-In Components (Q4923380) (← links)
- Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif (Q5253587) (← links)
- Web security: Authentication protocols and their analysis (Q5945162) (← links)