The following pages link to (Q4411969):
Displaying 7 items.
- On the semantics of Alice \& Bob specifications of security protocols (Q860900) (← links)
- Verification of cryptographic protocols: tagging enforces termination (Q1770413) (← links)
- Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (Q2268100) (← links)
- Hierarchical combination of intruder theories (Q2482450) (← links)
- The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols (Q3184787) (← links)
- Comparing State Spaces in Automatic Security Protocol Analysis (Q3631370) (← links)
- Types for Secure Pattern Matching with Local Knowledge in Universal Concurrent Constraint Programming (Q5325767) (← links)