Subject
Software,Theoretical Computer Science,Computational Theory and Mathematics,Logic
Reference34 articles.
1. Maude-npa: cryptographic protocol analysis modulo equational properties;Escobar,2007
2. Programming and symbolic computation in maude;Durán;J. Log. Algebraic Methods Program.,2020
3. The TAMARIN prover for the symbolic analysis of security protocols;Meier,2013
4. Automated verification of equivalence properties of cryptographic protocols;Chadha;ACM Trans. Comput. Log.,2016
5. State space reduction in the maude-nrl protocol analyzer;Escobar;Inf. Comput.,2014
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Symbolic Analysis by Using Folding Narrowing with Irreducibility and SMT Constraints;Proceedings of the 9th ACM SIGPLAN International Workshop on Formal Techniques for Safety-Critical Systems;2023-10-18