scyther
From MaRDI portal
Software:21450
No author found.
Related Items (14)
Causality, Behavioural Equivalences, and the Security of Cyberphysical Systems ⋮ LWDSA: light-weight digital signature algorithm for wireless sensor networks ⋮ The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ Formal analysis and offline monitoring of electronic exams ⋮ Deciding equivalence-based properties using constraint solving ⋮ Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol ⋮ Unnamed Item ⋮ Log Your Car: Reliable Maintenance Services Record ⋮ Designing reliable distributed systems. A formal methods approach based on executable modeling in Maude ⋮ Distributed temporal logic for the analysis of security protocol models ⋮ A procedure for deciding symbolic equivalence between sets of constraint systems ⋮ Computer-Aided Security Proofs for the Working Cryptographer ⋮ Automated Verification of Equivalence Properties of Cryptographic Protocols ⋮ Comparing State Spaces in Automatic Security Protocol Analysis
This page was built for software: scyther