SPEC: An Equivalence Checker for Security Protocols
From MaRDI portal
Publication:3179281
DOI10.1007/978-3-319-47958-3_5zbMath1483.68050OpenAlexW2528654130MaRDI QIDQ3179281
No author found.
Publication date: 21 December 2016
Published in: Programming Languages and Systems (Search for Journal in Brave)
Full work available at URL: http://orbilu.uni.lu/handle/10993/37433
Cryptography (94A60) Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.) (68Q85) Computer security (68M25)
Related Items (8)
Compositional analysis of protocol equivalence in the applied \(\pi \)-calculus using quasi-open bisimilarity ⋮ When privacy fails, a formula describes an attack: a complete and compositional verification method for the applied \(\pi\)-calculus ⋮ Equivalence checking 40 years after: a review of bisimulation tools ⋮ Unnamed Item ⋮ Unnamed Item ⋮ SPEC ⋮ Mechanized metatheory revisited ⋮ Unnamed Item
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- A calculus of mobile processes. II
- A calculus for cryptographic protocols: The spi calculus
- A theory of bisimulation for the \(\pi\)-calculus
- Automated verification of selected equivalences for security protocols
- Automated Verification of Equivalence Properties of Cryptographic Protocols
- Deciding security properties for cryptographic protocols. application to key cycles
- A Trace Based Bisimulation for the Spi Calculus: An Extended Abstract
- On the bisimulation proof method
- CONCUR 2004 - Concurrency Theory
This page was built for publication: SPEC: An Equivalence Checker for Security Protocols