Amanote Research

Amanote Research

    RegisterSign In

Improving Automatic Verification of Security Protocols With XOR

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-10373-5_6
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 2009

Authors
Xihui ChenTon van DeursenJun Pang
Publisher

Springer Berlin Heidelberg


Related search

Verification of Security Protocols

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2008English

Verification of Security Protocols

English

AnBx - Security Protocols Design and Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2010English

Automatic Verification of Temporal-Epistemic Properties of Cryptographic Protocols

Journal of Applied Non-Classical Logics
PhilosophyLogic
2009English

An Experiment in Automatic Generation of Test Suites for Protocols With Verification Technology

Science of Computer Programming
Software
1997English

Using Backward Induction Techniques in (Timed) Security Protocols Verification

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2013English

Automated Logic-Based Technique for Formal Verification of Security Protocols

Journal of Advances in Computer Networks
2018English

Automatic Completion of Distributed Protocols With Symmetry

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Formal Verification of Netlog Protocols

2012English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy