Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Casper - MaRDI portal

Casper

From MaRDI portal
Software:18651



swMATH6559MaRDI QIDQ18651


No author found.





Related Items (83)

Modeling Adversaries in a Logic for Security Protocol AnalysisOn Global Types and Multi-Party SessionProtocol insecurity with a finite number of sessions and composed keys is NP-complete.Source code verification of a secure payment appletComparative Analysis of Formal Model Checking Tools for Security Protocol VerificationUnnamed ItemProvably Repairing the ISO/IEC 9798 Standard for Entity AuthenticationUnnamed ItemProbabilistic and nondeterministic aspects of anonymityModel Checking Security ProtocolsProcess Algebra and Model CheckingAlice and Bob: Reconciling Formal Models and ImplementationThe Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security ProtocolsUnnamed ItemTrust ManagementAutomatic verification of secrecy properties for linear logic specifications of cryptographic protocolsUnnamed ItemUnnamed ItemLogics in Artificial IntelligenceUnnamed ItemOn the semantics of Alice \& Bob specifications of security protocolsInjective synchronisation: An extension of the authentication hierarchyUnnamed ItemFormal correctness of security protocols.Theory and Applications of Satisfiability TestingUnnamed ItemOperational semantics and verification of security protocols.Alice and Bob Meet Equational TheoriesUnnamed ItemModeling and Analysis of Security Protocols Using Role Based Specifications and Petri NetsUnnamed ItemFormal Methods for Assuring Security of ProtocolsUnnamed ItemSAT-solving in CSP trace refinementLog Your Car: Reliable Maintenance Services RecordUnnamed ItemUnnamed ItemAlgebraic Intruder DeductionsSpecification of communicating processes: temporal logic versus refusals-based refinementEfficient representation of the attacker's knowledge in cryptographic protocols analysisZB 2005: Formal Specification and Development in Z and BA formal semantics for protocol narrationsUnnamed ItemCommunicating Sequential Processes. The First 25 YearsUnnamed ItemApplication-Binding Protocol in the User Centric Smart Card Ownership ModelKey Compromise, Strand Spaces, and the Authentication Tests1 1I gave my MFPS 17 talk on 24 May 2001, Bob Dylan's sixtieth birthday. This paper is dedicated to him.Modeling and Verifying Time Sensitive Security Protocols with ConstraintsUnnamed ItemUnnamed ItemUnnamed ItemUnnamed ItemComputationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairingsSeVe: automatic tool for verification of security protocolsSAT-Based Verification of Security Protocols Via Translation to Networks of AutomataRelating two standard notions of secrecyDistributed temporal logic for the analysis of security protocol modelsProbabilistic anonymity via coalgebraic simulationsMathematical Foundations of Computer Science 2003Automatic verification of temporal-epistemic properties of cryptographic protocolsPattern-matching spi-calculusFST TCS 2003: Foundations of Software Technology and Theoretical Computer ScienceSearching for Shapes in Cryptographic ProtocolsCompiling and securing cryptographic protocolsIntegrating Verification, Testing, and Learning for Cryptographic ProtocolsConstraints Solution for Time Sensitive Security ProtocolsCryptographic Protocol Composition via the Authentication TestsSecure Systems Development with UMLRelating Strand Spaces and Distributed Temporal Logic for Security Protocol AnalysisRecent Trends in Algebraic Development TechniquesComparing State Spaces in Automatic Security Protocol AnalysisFDR explorerCONCUR 2005 – Concurrency TheoryFoundations of Software Science and Computation StructuresSafely composing security protocolsEXPLOITING SYMMETRIES FOR TESTING EQUIVALENCE VERIFICATION IN THE SPI CALCULUSUnnamed ItemTools and Algorithms for the Construction and Analysis of SystemsProgramming Languages and SystemsUnnamed ItemUnnamed ItemExplicit Randomness is not Necessary when Modeling Probabilistic EncryptionAuthentication tests and the structure of bundles.


This page was built for software: Casper