YAPA
From MaRDI portal
Software:15278
No author found.
Related Items (16)
Automated Verification of Equivalence Properties of Cryptographic Protocols ⋮ Model Checking Security Protocols ⋮ The Applied Pi Calculus ⋮ Maude-NPA: Cryptographic Protocol Analysis Modulo Equational Properties ⋮ Stateful applied pi calculus: observational equivalence and labelled bisimilarity ⋮ Reducing equational theories for the decision of static equivalence ⋮ Computing knowledge in security protocols under convergent equational theories ⋮ Computing knowledge in equational extensions of subterm convergent theories ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ Intruder deduction problem for locally stable theories with normal forms and inverses ⋮ Automating Security Analysis: Symbolic Equivalence of Constraint Systems ⋮ Computing Knowledge in Security Protocols under Convergent Equational Theories ⋮ Compiling and securing cryptographic protocols ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols ⋮ Deciding knowledge in security protocols under some e-voting theories ⋮ Unnamed Item
This page was built for software: YAPA