The CL-Atse Protocol Analyser
From MaRDI portal
Publication:3527301
DOI10.1007/11805618_21zbMath1151.68454OpenAlexW2162325770MaRDI QIDQ3527301
Publication date: 25 September 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11805618_21
Related Items (9)
Model Checking Security Protocols ⋮ The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ Intruder deduction for the equational theory of abelian groups with distributive encryption ⋮ Computing knowledge in equational extensions of subterm convergent theories ⋮ Intruder deducibility constraints with negation. Decidability and application to secured service compositions ⋮ Satisfiability of general intruder constraints with and without a set constructor ⋮ Distributed temporal logic for the analysis of security protocol models ⋮ Tree Automata for Detecting Attacks on Protocols with Algebraic Cryptographic Primitives ⋮ Comparing State Spaces in Automatic Security Protocol Analysis
Uses Software
This page was built for publication: The CL-Atse Protocol Analyser