ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
An Optimized Intruder Model for SAT-based Model-Checking of Security Protocols
Electronic Notes in Theoretical Computer Science
◽
10.1016/j.entcs.2004.05.021
◽
2005
◽
Vol 125
(1)
◽
pp. 91-108
◽
Cited By ~ 14
Author(s):
Alessandro Armando
◽
Luca Compagna
Keyword(s):
Model Checking
◽
Security Protocols
Download Full-text
Related Documents
Cited By
References
From Model-Checking to Automated Testing of Security Protocols: Bridging the Gap
Tests and Proofs - Lecture Notes in Computer Science
◽
10.1007/978-3-642-30473-6_3
◽
2012
◽
pp. 3-18
◽
Cited By ~ 14
Author(s):
Alessandro Armando
◽
Giancarlo Pellegrino
◽
Roberto Carbone
◽
Alessio Merlo
◽
Davide Balzarotti
Keyword(s):
Model Checking
◽
Security Protocols
◽
Automated Testing
Download Full-text
A framework for probabilistic model checking of security protocols using coloured stochastic activity networks and PDETool
2010 5th International Symposium on Telecommunications
◽
10.1109/istel.2010.5734026
◽
2010
◽
Cited By ~ 2
Author(s):
Mojtaba Akbarzadeh
◽
Mohammad Abdollahi Azgomi
Keyword(s):
Model Checking
◽
Probabilistic Model
◽
Security Protocols
◽
Probabilistic Model Checking
◽
Stochastic Activity Networks
◽
Activity Networks
◽
Stochastic Activity
Download Full-text
Model checking wireless sensor network security protocols: TinySec + LEAP + TinyPK
Telecommunication Systems
◽
10.1007/s11235-008-9131-z
◽
2008
◽
Vol 40
(3-4)
◽
pp. 91-99
◽
Cited By ~ 11
Author(s):
Llanos Tobarra
◽
Diego Cazorla
◽
Fernando Cuartero
◽
Gregorio Díaz
◽
Emilia Cambronero
Keyword(s):
Wireless Sensor Network
◽
Network Security
◽
Model Checking
◽
Sensor Network
◽
Security Protocols
◽
Wireless Sensor
◽
Sensor Network Security
◽
Wireless Sensor Network Security
Download Full-text
On-the-fly Model Checking of Security Protocols and Its Implementation by Maude
IPSJ Digital Courier
◽
10.2197/ipsjdc.3.343
◽
2007
◽
Vol 3
◽
pp. 343-368
Author(s):
Guoqiang Li
◽
Mizuhito Ogawa
Keyword(s):
Model Checking
◽
Security Protocols
Download Full-text
Parallel Bounded Model Checking of Security Protocols
Parallel Processing and Applied Mathematics - Lecture Notes in Computer Science
◽
10.1007/978-3-642-55224-3_22
◽
2014
◽
pp. 224-234
◽
Cited By ~ 2
Author(s):
Mirosław Kurkowski
◽
Olga Siedlecka-Lamch
◽
Sabina Szymoniak
◽
Henryk Piech
Keyword(s):
Model Checking
◽
Security Protocols
◽
Bounded Model Checking
Download Full-text
Model Checking of Security Protocols with Pre-configuration
Information Security Applications - Lecture Notes in Computer Science
◽
10.1007/978-3-540-24591-9_1
◽
2004
◽
pp. 1-15
Author(s):
Kyoil Kim
◽
Jacob A. Abraham
◽
Jayanta Bhadra
Keyword(s):
Model Checking
◽
Security Protocols
Download Full-text
Model Checking for Security Protocols,
10.21236/ada327281
◽
1997
◽
Cited By ~ 59
Author(s):
Will Marrero
◽
Edmund Clarke
◽
Somesh Jha
Keyword(s):
Model Checking
◽
Security Protocols
Download Full-text
Model Checking Security Protocols Using a Logic of Belief
Tools and Algorithms for the Construction and Analysis of Systems - Lecture Notes in Computer Science
◽
10.1007/3-540-46419-0_35
◽
2000
◽
pp. 519-534
◽
Cited By ~ 5
Author(s):
Massimo Benerecetti
◽
Fausto Giunchiglia
Keyword(s):
Model Checking
◽
Security Protocols
Download Full-text
Model Checking Indistinguishability of Randomized Security Protocols
Computer Aided Verification - Lecture Notes in Computer Science
◽
10.1007/978-3-319-96142-2_10
◽
2018
◽
pp. 117-135
Author(s):
Matthew S. Bauer
◽
Rohit Chadha
◽
A. Prasad Sistla
◽
Mahesh Viswanathan
Keyword(s):
Model Checking
◽
Security Protocols
Download Full-text
LTL model checking for security protocols
Journal of Applied Non-Classical Logics
◽
10.3166/jancl.19.403-429
◽
2009
◽
Vol 19
(4)
◽
pp. 403-429
◽
Cited By ~ 24
Author(s):
Alessandro Armando
◽
Roberto Carbone
◽
Luca Compagna
Keyword(s):
Model Checking
◽
Security Protocols
◽
Ltl Model Checking
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close