Skip to Main Content Area
  • CPS-VO
    • Contact Support
      
 
Not a member?
Click here to register!
Forgot username or password?
 
logo
logo
Science of Security VO
  • Home
  • Archive
  • About
  • Search
  • Calendar
  • Members
  • Contact Us
  • Forums
  • Files
CPS-VO » Science of Security VO » CRYPTOGRAPHIC PROTOCOLS

Cryptographic Protocols

biblio

Visible to the public A Rewriting-based Forwards Semantics for Maude-NPA

Submitted by Jose Meseguer on Wed, 09/17/2014 - 6:30pm
  • Modeling
  • Science of Security
  • Simulation
  • Foundations
  • ACM CCS
  • Applied cryptography
  • cryptographic protocol analysis
  • Cryptographic Protocols
  • Cryptography
  • foundations
  • logical narrowing-based reachability analysis
  • model checking
  • modeling
  • protocol verification
  • reasoning modulo an equational theory
  • Science of Security
  • simulation
  • standard rewriting-based model checking
  • term rewriting
  • ACM CCS
  • Cryptography
  • Applied Cryptography
  • Cryptographic Protocols
file

Visible to the public A Rewriting-Based Forwards Semantics for Maude-NPA

Submitted by Jose Meseguer on Tue, 06/03/2014 - 5:35pm. Contributors:
  • Santiago Escobar
  • Catherine Meadows
  • Sonia Santiago
  • Jose Meseguer
  • cryptographic protocol analysis
  • logical narrowing-based reachability analysis
  • reasoning
  • standard rewriting-based model checking
  • HotSoS 2014
  • Academia
  • Presentations
  • Presentation Slides
  • Cryptographic Protocols
file

Visible to the public Foundations and Analysis of Protocol Indistinguishability

Submitted by Anonymous on Mon, 12/03/2012 - 6:54pm. Contributors:
  • Jose Meseguer
  • Catherine Meadows
  • S. Escobar

ABSTRACT

  • Maude-NPA
  • UIUC
  • Academia
  • Poster
  • Posters
  • Science of Security Community Meeting, Nov '12
  • Cryptographic Protocols
  • Indistinguishability

Terms of Use  |  ©2023. CPS-VO