Gaining trust by tracing security protocols
From MaRDI portal
Publication:2095430
DOI10.1016/j.jlamp.2022.100829OpenAlexW4307045153MaRDI QIDQ2095430
Clara Benac Earle, Thomas Arts, Hans Svensson, Lars-åke Fredlund
Publication date: 16 November 2022
Published in: Journal of Logical and Algebraic Methods in Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jlamp.2022.100829
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Synthesising correct concurrent runtime monitors
- A structural approach to operational semantics
- The Security Impact of a New Cryptographic Library
- Provenance as dependency analysis
- A Principled Approach to Tracking Information Flow in the Presence of Libraries
- New directions in cryptography
- A lattice model of secure information flow
- Flexible Authenticated and Confidential Channel Establishment (fACCE): Analyzing the Noise Protocol Framework
- Proved trees
- Formal Approaches to Software Testing
- Verification, Model Checking, and Abstract Interpretation
This page was built for publication: Gaining trust by tracing security protocols