Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
The NRL Protocol Analyzer: An Overview - MaRDI portal

The NRL Protocol Analyzer: An Overview

From MaRDI portal
Publication:3128627

DOI10.1016/0743-1066(95)00095-XzbMath0871.68052MaRDI QIDQ3128627

Catherine A. Meadows

Publication date: 17 April 1997

Published in: The Journal of Logic Programming (Search for Journal in Brave)




Related Items (40)

Protocol insecurity with a finite number of sessions and composed keys is NP-complete.Model Checking Security ProtocolsMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesThe Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsJoshua Guttman: pioneering strand spacesAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsComplete symbolic reachability analysis using back-and-forth narrowingA rewriting-based inference system for the NRL protocol analyzer and its meta-logical propertiesSymbolic reachability analysis using narrowing and its application to verification of cryptographic protocolsRepresenting the MSR cryptoprotocol specification language in an extension of rewriting logic with dependent typesThreat scenarios as a means to formally develop secure systemsTwenty years of rewriting logicSymbolic Specialization of Rewriting Logic Theories with PrestoState space reduction in the Maude-NRL protocol analyzerChallenges in the Automated Verification of Security ProtocolsBounding messages for free in security protocols -- extension to various security propertiesRelating State-Based and Process-Based Concurrency through Linear LogicRule-based static analysis of network protocol implementationsHierarchical combination of intruder theoriesAbstraction and resolution modulo AC: How to verify Diffie--Hellman-like protocols automaticallyRefinement-Preserving Plug-In ComponentsDistributed temporal logic for the analysis of security protocol modelsTree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic PrimitivesAutomating Security Analysis: Symbolic Equivalence of Constraint SystemsSymbolic protocol analysis in the union of disjoint intruder theories: combining decision proceduresWeb security: Authentication protocols and their analysisLTL model checking for security protocolsAutomatic verification of temporal-epistemic properties of cryptographic protocolsRelating state-based and process-based concurrency through linear logic (full-version)Key Substitution in the Symbolic Analysis of Cryptographic ProtocolsNRLAttacking Fair-Exchange ProtocolsAutomatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerifAnalysis of security protocols as open systemsA new logic for electronic commerce protocolsProtocol Composition Logic (PCL)Possibilistic Information Flow Control in the Presence of Encrypted CommunicationTemporal Logics of Knowledge and their Applications in SecurityFinite-state analysis of two contract signing protocolsNarrowing and Rewriting Logic: from Foundations to Applications




This page was built for publication: The NRL Protocol Analyzer: An Overview