Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties - MaRDI portal

Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties

From MaRDI portal
Publication:3184784

DOI10.1007/978-3-642-03829-7_1zbMath1252.94061OpenAlexW1536580911MaRDI QIDQ3184784

Santiago Escobar, José Meseguer, Catherine A. Meadows

Publication date: 22 October 2009

Published in: Foundations of Security Analysis and Design V (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03829-7_1




Related Items (38)

Model Checking Security ProtocolsSymbolic Protocol Analysis with Disequality Constraints Modulo Equational TheoriesMaude-NPA: Cryptographic Protocol Analysis Modulo Equational PropertiesSecure key management policies in strand spacesSentence-normalized conditional narrowing modulo in rewriting logic and MaudeModular verification of protocol equivalence in the presence of randomnessOptimization of rewrite theories by equational partial evaluationJosé Meseguer: Scientist and Friend ExtraordinaireSentence-Normalized Conditional Narrowing Modulo in Rewriting Logic and MaudeAlice and Bob Meet Equational TheoriesTwo Decades of MaudeTwenty years of rewriting logicAn efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysisSymbolic Specialization of Rewriting Logic Theories with PrestoSecurity Protocol Analysis in Context: Computing Minimal Executions Using SMT and CPSAVariants and satisfiability in the infinitary unification wonderlandA formalisation of nominal \(\alpha\)-equivalence with A, C, and AC function symbolsOptimizing Maude programs via program specializationStrand spaces with choice via a process algebra semanticsUnnamed ItemUnnamed ItemEfficient general AGH-unificationState space reduction in the Maude-NRL protocol analyzerBounded ACh unificationComputing knowledge in equational extensions of subterm convergent theoriesBeyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsA formalisation of nominal \(\alpha\)-equivalence with A and AC function symbolsIntruder deduction problem for locally stable theories with normal forms and inversesVariant-Based Satisfiability in Initial AlgebrasEfficient General Unification for XOR with HomomorphismGeneralized rewrite theories, coherence completion, and symbolic methodsProgramming and symbolic computation in MaudeAutomated Verification of Equivalence Properties of Cryptographic ProtocolsBuilt-in Variant Generation and Unification, and Their Applications in Maude 2.7Combining proverif and automated theorem provers for security protocol verificationEquational unification and matching, and symbolic reachability analysis in Maude 3.2 (system description)Symbolic computation in Maude: some tapasTerminating non-disjoint combined unification


Uses Software


Cites Work


This page was built for publication: Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties