[图书][B] Security properties

C Cremers, S Mauw, C Cremers, S Mauw - 2012 - Springer
Security Properties | SpringerLink Skip to main content Advertisement SpringerLink Account
Menu Find a journal Publish with us Track your research Search Cart Book cover …

[PDF][PDF] Maude manual (version 3.0)

M Clavel, F Durán, S Eker, S Escobar… - SRI …, 2020 - maude.cs.illinois.edu
This introduction tries to give the big picture on the goals, design philosophy, logical
foundations, applications, and overall structure of Maude. It is written in an impressionistic …

[PDF][PDF] Formal analysis of key exchange protocols and physical protocols

B Schmidt - 2012 - research-collection.ethz.ch
A security protocol is a distributed program that might be executed on a network controlled
by an adversary. Even in such a setting, the protocol should satisfy the desired security …

On forward closure and the finite variant property

C Bouchard, KA Gero, C Lynch… - Frontiers of Combining …, 2013 - Springer
Equational unification is an important research area with many applications, such as
cryptographic protocol analysis. Unification modulo a convergent term rewrite system is …

Symbolic Analysis by Using Folding Narrowing with Irreducibility and SMT Constraints

S Escobar, R López-Rueda, J Sapiña - Proceedings of the 9th ACM …, 2023 - dl.acm.org
Symbolic reachability analysis using rewriting with Satisfiability Modulo Theories (SMT) has
been used to model different systems, including a variety of security protocols. Recently, it …

[HTML][HTML] Constrained narrowing for conditional equational theories modulo axioms

A Cholewa, S Escobar, J Meseguer - Science of Computer Programming, 2015 - Elsevier
For an unconditional equational theory (Σ, E) whose oriented equations E→ are confluent
and terminating, narrowing provides an E-unification algorithm. This has been generalized …

Asymmetric unification: A new unification paradigm for cryptographic protocol analysis

S Erbatur, S Escobar, D Kapur, Z Liu, CA Lynch… - … on Automated Deduction, 2013 - Springer
We present a new paradigm for unification arising out of a technique commonly used in
cryptographic protocol analysis tools that employ unification modulo equational theories …

Information Security and Cryptography

U Maurer, M Abadi, R Anderson, M Bellare… - 2007 - Springer
Untitled Page 1 Page 2 Information Security and Cryptography Texts and Monographs
Series Editor Ueli Maurer Associate Editors Martin Abadi Ross Anderson Mihir Bellare …

[HTML][HTML] An efficient canonical narrowing implementation with irreducibility and SMT constraints for generic symbolic protocol analysis

R López-Rueda, S Escobar, J Sapiña - … of Logical and Algebraic Methods in …, 2023 - Elsevier
Narrowing and unification are very useful tools for symbolic analysis of rewrite theories, and
thus for any model that can be specified in that way. A very clear example of their application …

Symbolic protocol analysis with disequality constraints modulo equational theories

S Escobar, C Meadows, J Meseguer… - … with Applications to …, 2015 - Springer
Research in the formal analysis of cryptographic protocols has produced much good work in
the solving of equality constraints, developing new methods for unification, matching, and …