TAMARIN
From MaRDI portal
Software:35211
No author found.
Related Items (max. 100)
Relating Process Languages for Security and Communication Correctness (Extended Abstract) ⋮ MoSS: modular security specifications framework ⋮ Protocol analysis with time and space ⋮ Formal analysis and offline monitoring of electronic exams ⋮ Alice and Bob Meet Equational Theories ⋮ Emerging Issues and Trends in Formal Methods in Cryptographic Protocol Analysis: Twelve Years Later ⋮ Unnamed Item ⋮ Unnamed Item ⋮ Designing reliable distributed systems. A formal methods approach based on executable modeling in Maude ⋮ Automated type-based analysis of injective agreement in the presence of compromised principals ⋮ Beyond Subterm-Convergent Equational Theories in Automated Verification of Stateful Protocols ⋮ On Communication Models When Verifying Equivalence Properties ⋮ A survey of symbolic methods for establishing equivalence-based properties in cryptographic protocols ⋮ A procedure for deciding symbolic equivalence between sets of constraint systems ⋮ A decidable class of security protocols for both reachability and equivalence properties ⋮ Programming and symbolic computation in Maude ⋮ Built-in Variant Generation and Unification, and Their Applications in Maude 2.7 ⋮ Combining proverif and automated theorem provers for security protocol verification ⋮ Gaining trust by tracing security protocols ⋮ Equational unification and matching, and symbolic reachability analysis in Maude 3.2 (system description) ⋮ Symbolic computation in Maude: some tapas ⋮ Terminating non-disjoint combined unification
This page was built for software: TAMARIN