Author:
Arapinis Myrto,Duflot Marie
Subject
Computational Theory and Mathematics,Computer Science Applications,Information Systems,Theoretical Computer Science
Reference34 articles.
1. The AVISS security protocol analysis tool;Armando,2002
2. Bounding messages for free in security protocols;Arapinis,2007
3. Prudent engineering practice for cryptographic protocols;Abadi;IEEE Trans. Softw. Eng.,1996
4. An efficient cryptographic protocol verifier based on prolog rules;Blanchet,2001
5. Pattern-based abstraction for verifying secrecy in protocols;Bozga;Int. J. Softw. Tools Technol. Transf.,2006
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Stateful Protocol Composition in Isabelle/HOL;ACM Transactions on Privacy and Security;2023-04-14
2. Performing Security Proofs of Stateful Protocols;2021 IEEE 34th Computer Security Foundations Symposium (CSF);2021-06
3. A Typing Result for Stateful Protocols;2018 IEEE 31st Computer Security Foundations Symposium (CSF);2018-07
4. Formalizing and Proving a Typing Result for Security Protocols in Isabelle/HOL;2017 IEEE 30th Computer Security Foundations Symposium (CSF);2017-08
5. Typing and Compositionality for Security Protocols: A Generalization to the Geometric Fragment;Computer Security -- ESORICS 2015;2015