Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
TAMARIN - MaRDI portal

TAMARIN

From MaRDI portal
Software:35211



swMATH23438MaRDI QIDQ35211


No author found.





Related Items (max. 100)

Relating Process Languages for Security and Communication Correctness (Extended Abstract)MoSS: modular security specifications frameworkProtocol analysis with time and spaceFormal analysis and offline monitoring of electronic examsAlice and Bob Meet Equational TheoriesEmerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years LaterUnnamed ItemUnnamed ItemDesigning reliable distributed systems. A formal methods approach based on executable modeling in MaudeAutomated type-based analysis of injective agreement in the presence of compromised principalsBeyond Subterm-Convergent Equational Theories in Automated Verification of Stateful ProtocolsOn Communication Models When Verifying Equivalence PropertiesA survey of symbolic methods for establishing equivalence-based properties in cryptographic protocolsA procedure for deciding symbolic equivalence between sets of constraint systemsA decidable class of security protocols for both reachability and equivalence propertiesProgramming and symbolic computation in MaudeBuilt-in Variant Generation and Unification, and Their Applications in Maude 2.7Combining proverif and automated theorem provers for security protocol verificationGaining trust by tracing security protocolsEquational unification and matching, and symbolic reachability analysis in Maude 3.2 (system description)Symbolic computation in Maude: some tapasTerminating non-disjoint combined unification


This page was built for software: TAMARIN