Constraint Abstraction in Verification of Security Protocols
From MaRDI portal
Publication:3507341
DOI10.1007/978-3-540-69311-6_27zbMath1143.68465OpenAlexW1734011495MaRDI QIDQ3507341
Mengjun Li, Huowang Chen, Zhou-Jun Li, Ti Zhou
Publication date: 19 June 2008
Published in: Frontiers in Algorithmics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-69311-6_27
Specification and verification (program logics, model checking, etc.) (68Q60) Network protocols (68M12)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A simple framework for real-time cryptographic protocol analysis with compositional proof rules
- Constraints Solution for Time Sensitive Security Protocols
- On the security of public key protocols
- Analyzing security protocols with secrecy types and logic programs
- Tools and Algorithms for the Construction and Analysis of Systems
- CONCUR 2004 - Concurrency Theory
This page was built for publication: Constraint Abstraction in Verification of Security Protocols