The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that m...
מחבר ראשי: | Cremers, C |
---|---|
פורמט: | Book section |
יצא לאור: |
Springer
2008
|
פריטים דומים
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
מאת: Cremers, C
יצא לאור: (2008) -
Verification, falsification and cancellation in KT
מאת: Williamson, T
יצא לאור: (1990) -
Verification and Falsification of Programs with Loops Using Predicate Abstraction
מאת: Kroening, D, et al.
יצא לאור: (2009) -
Verification and falsification of programs with loops using predicate abstraction.
מאת: Kroening, D, et al.
יצא לאור: (2010) -
A framework for compositional verification of security protocols
מאת: Andova, S, et al.
יצא לאור: (2006)