The following pages link to Akiss (Q32423):
Displaying 15 items.
- Deciding equivalence-based properties using constraint solving (Q391121) (← links)
- A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols (Q511946) (← links)
- Review of cryptographic schemes applied to remote electronic voting systems: remaining challenges and the upcoming post-quantum paradigm (Q1643980) (← links)
- A procedure for deciding symbolic equivalence between sets of constraint systems (Q2013557) (← links)
- A decidable class of security protocols for both reachability and equivalence properties (Q2031426) (← links)
- Equational unification and matching, and symbolic reachability analysis in Maude 3.2 (system description) (Q2104541) (← links)
- Stateful applied pi calculus: observational equivalence and labelled bisimilarity (Q2397042) (← links)
- Formal analysis and offline monitoring of electronic exams (Q2402552) (← links)
- SPEC: An Equivalence Checker for Security Protocols (Q3179281) (← links)
- Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols (Q3304811) (← links)
- On Communication Models When Verifying Equivalence Properties (Q3304813) (← links)
- (Q4993330) (← links)
- Computing knowledge in equational extensions of subterm convergent theories (Q5139279) (← links)
- (Q5270090) (← links)
- Automated Verification of Equivalence Properties of Cryptographic Protocols (Q5278194) (← links)