Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
cryptographic protocol analysis
file
Theories of Homomorphic Encryption Unification and the Finite Variant Property
Submitted by amyclay on Wed, 11/18/2015 - 3:02pm
cryptographic protocol analysis
finite variant property
Homomorphic encryption
unification
UIUC
biblio
Theories for Homomorphic Encryption, Unification and the Finite Variant Property
Submitted by amyclay on Wed, 11/18/2015 - 3:02pm
cryptographic protocol analysis
finite variant property
Homomorphic encryption
unification
UIUC
file
A Rewriting-based Forwards Semantics for Maude-NPA
Submitted by amyclay on Wed, 11/18/2015 - 2:45pm
cryptographic protocol analysis
logical narrowing-based reachability analysis
reasoning modulo an equational theory
standard rewriting-based model checking
UIUC
biblio
A Rewriting-based Forward Semantics for Maude-NPA
Submitted by amyclay on Wed, 11/18/2015 - 2:44pm
cryptographic protocol analysis
logical narrowing-based reachability analysis
reasoning modulo an equational theory
standard rewriting-based model checking
UIUC
biblio
A Rewriting-based Forwards Semantics for Maude-NPA
Submitted by Jose Meseguer on Wed, 09/17/2014 - 5:30pm
Modeling
Science of Security
Simulation
Foundations
ACM CCS
Applied cryptography
cryptographic protocol analysis
Cryptographic Protocols
Cryptography
foundations
logical narrowing-based reachability analysis
model checking
modeling
protocol verification
reasoning modulo an equational theory
Science of Security
simulation
standard rewriting-based model checking
term rewriting
ACM CCS
Cryptography
Applied Cryptography
Cryptographic Protocols
file
A Rewriting-Based Forwards Semantics for Maude-NPA
Submitted by Jose Meseguer on Tue, 06/03/2014 - 4:35pm. Contributors:
Santiago Escobar
Catherine Meadows
Sonia Santiago
Jose Meseguer
cryptographic protocol analysis
logical narrowing-based reachability analysis
reasoning
standard rewriting-based model checking
HotSoS 2014
Academia
Presentations
Presentation Slides
Cryptographic Protocols