Protocol analysis with time and space
From MaRDI portal
Publication:2154006
DOI10.1007/978-3-030-91631-2_2zbMath1498.94052OpenAlexW3217174074MaRDI QIDQ2154006
Julia Sapiña, José Meseguer, Santiago Escobar, Damián Aparicio-Sánchez, Catherine A. Meadows
Publication date: 13 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-91631-2_2
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85)
Related Items (2)
An efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysis ⋮ Local confluence of conditional and generalized term rewriting systems
Uses Software
Cites Work
- Unnamed Item
- State space reduction in the Maude-NRL protocol analyzer
- A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties
- Protocol analysis with time
- Towards the automated verification of cyber-physical security protocols: bounding the number of timed intruders
- Let’s Get Physical: Models and Methods for Real-World Security Protocols
- Symbolic Protocol Analysis with Disequality Constraints Modulo Equational Theories
This page was built for publication: Protocol analysis with time and space