Computing knowledge in security protocols under convergent equational theories
From MaRDI portal
Publication:437033
DOI10.1007/s10817-010-9197-7zbMath1242.68098OpenAlexW2057936571MaRDI QIDQ437033
Stéphanie Delaune, Ştefan Ciobâcă, Steve Kremer
Publication date: 17 July 2012
Published in: Journal of Automated Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10817-010-9197-7
Lua error in Module:PublicationMSCList at line 37: attempt to index local 'msc_result' (a nil value).
Related Items (7)
Unnamed Item ⋮ Computing knowledge in equational extensions of subterm convergent theories ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ Computing Knowledge in Security Protocols under Convergent Equational Theories ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols ⋮ Probability timed automata for investigating communication processes ⋮ Terminating non-disjoint combined unification
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Deciding knowledge in security protocols under equational theories
- Intruder deduction for the equational theory of abelian groups with distributive encryption
- Protocol insecurity with a finite number of sessions and composed keys is NP-complete.
- Automated verification of selected equivalences for security protocols
- Deciding knowledge in security protocols under some e-voting theories
- Deciding Knowledge in Security Protocols for Monoidal Equational Theories
- Combining Algorithms for Deciding Knowledge in Security Protocols
- Verifying Privacy-Type Properties of Electronic Voting Protocols: A Taster
- YAPA: A Generic Tool for Computing Intruder Knowledge
- Mobile values, new names, and secure communication
- Computing Knowledge in Security Protocols under Convergent Equational Theories
- Programming Languages and Systems
- Intruders with Caps
- Key Substitution in the Symbolic Analysis of Cryptographic Protocols
- Computer Aided Verification
This page was built for publication: Computing knowledge in security protocols under convergent equational theories