Author:
Bauer Matthew S.,Chadha Rohit,Prasad Sistla A.,Viswanathan Mahesh
Publisher
Springer International Publishing
Reference57 articles.
1. https://github.com/bauer-matthews/SPAN
2. http://www.apfloat.org/
3. https://github.com/bauer-matthews/SPAN/tree/master/src/test/resources/examples/indistinguishability
4. Abadi, M., Cortier, V.: Deciding knowledge in security protocols under equational theories. Theor. Comput. Sci. 367(1–2), 2–32 (2006)
5. Abadi, M., Fournet, C.: Mobile values, new names, and secure communication. In: ACM SIGPLAN Notices, vol. 36, pp. 104–115. ACM (2001)
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Symbolic protocol verification with dice1;Journal of Computer Security;2023-10-13
2. Modelling program verification tools for software engineers;Proceedings of the 25th International Conference on Model Driven Engineering Languages and Systems;2022-10-23
3. Symbolic protocol verification with dice: process equivalences in the presence of probabilities;2022 IEEE 35th Computer Security Foundations Symposium (CSF);2022-08
4. Modelchecking Safety Properties in Randomized Security Protocols;Logic, Language, and Security;2020