scientific article; zbMATH DE number 1341618
From MaRDI portal
Publication:4263167
zbMath1038.94548MaRDI QIDQ4263167
Publication date: 17 February 2000
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
Secrecy types for asymmetric communication., Crossing the Syntactic Barrier: Hom-Disequalities for ${\mathcal H}_1$-Clauses, A rewriting-based inference system for the NRL protocol analyzer and its meta-logical properties, Verifying Cryptographic Protocols with Subterms Constraints, Extending \(H_1\)-clauses with disequalities, First-Order Logic Theorem Proving and Model Building via Approximation and Instantiation, State space reduction in the Maude-NRL protocol analyzer, Superposition for Fixed Domains, Challenges in the Automated Verification of Security Protocols, Normalization of Linear Horn Clauses, Harald Ganzinger’s Legacy: Contributions to Logics and Programming, From Search to Computation: Redundancy Criteria and Simplification at Work, On the relationships between models in protocol verification, Verification of cryptographic protocols: tagging enforces termination, Automating Security Analysis: Symbolic Equivalence of Constraint Systems, System Description: SPASS-FD, A domain-specific language for cryptographic protocols based on streams, Key Substitution in the Symbolic Analysis of Cryptographic Protocols, Paths, tree homomorphisms and disequalities for -clauses, Automated Verification of Equivalence Properties of Cryptographic Protocols, Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables, SPASS-AR: a first-order theorem prover based on approximation-refinement into the monadic shallow linear fragment, Deciding the Inductive Validity of ∀ ∃ * Queries, Deciding \(\mathcal H_1\) by resolution, Security protocols: from linear to classical logic by abstract interpretation, Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif, On the symbolic reduction of processes with cryptographic functions., Finite reasons for safety
Uses Software