Automated Verification of Equivalence Properties of Cryptographic Protocols
From MaRDI portal
Publication:2892723
DOI10.1007/978-3-642-28869-2_6zbMath1352.68148OpenAlexW1588028307MaRDI QIDQ2892723
Ştefan Ciobâcă, Steve Kremer, Rohit Chadha
Publication date: 22 June 2012
Published in: Programming Languages and Systems (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28869-2_6
Related Items
SPEC: An Equivalence Checker for Security Protocols ⋮ Stateful applied pi calculus: observational equivalence and labelled bisimilarity ⋮ POR for security protocol equivalences. Beyond action-determinism ⋮ Efficiently deciding equivalence for standard primitives and phases ⋮ Formal analysis and offline monitoring of electronic exams ⋮ Deciding equivalence-based properties using constraint solving ⋮ Unnamed Item ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ A procedure for deciding symbolic equivalence between sets of constraint systems ⋮ Variant-Based Satisfiability in Initial Algebras ⋮ A decidable class of security protocols for both reachability and equivalence properties ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols ⋮ Akiss
Uses Software