The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that m...
Egile nagusia: | Cremers, C |
---|---|
Formatua: | Book section |
Argitaratua: |
Springer
2008
|
Antzeko izenburuak
Antzeko izenburuak
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
nork: Cremers, C
Argitaratua: (2008) -
Verification, falsification and cancellation in KT
nork: Williamson, T
Argitaratua: (1990) -
Verification and Falsification of Programs with Loops Using Predicate Abstraction
nork: Kroening, D, et al.
Argitaratua: (2009) -
Verification and falsification of programs with loops using predicate abstraction.
nork: Kroening, D, et al.
Argitaratua: (2010) -
A framework for compositional verification of security protocols
nork: Andova, S, et al.
Argitaratua: (2006)