ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 0802.3444
  4. Cited By
Automatic Verification of Correspondences for Security Protocols

Automatic Verification of Correspondences for Security Protocols

23 February 2008
B. Blanchet
ArXivPDFHTML

Papers citing "Automatic Verification of Correspondences for Security Protocols"

20 / 20 papers shown
Title
Provably Unlinkable Smart Card-based Payments
Provably Unlinkable Smart Card-based Payments
Sergiu Bursuc
Ross Horne
S. Mauw
S. Yurkov
17
1
0
06 Sep 2023
The Security Protocol Verifier ProVerif and its Horn Clause Resolution
  Algorithm
The Security Protocol Verifier ProVerif and its Horn Clause Resolution Algorithm
B. Blanchet
11
7
0
22 Nov 2022
$A^2RID$ -- Anonymous Direct Authentication and Remote Identification of
  Commercial Drones
A2RIDA^2RIDA2RID -- Anonymous Direct Authentication and Remote Identification of Commercial Drones
E. Wisse
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
9
13
0
21 Oct 2022
Satellite-Based Communications Security: A Survey of Threats, Solutions,
  and Research Challenges
Satellite-Based Communications Security: A Survey of Threats, Solutions, and Research Challenges
Pietro Tedeschi
Savio Sciancalepore
Roberto Di Pietro
31
94
0
21 Dec 2021
Bulwark: Holistic and Verified Security Monitoring of Web Protocols
Bulwark: Holistic and Verified Security Monitoring of Web Protocols
Lorenzo Veronese
Stefano Calzavara
Luca Demetrio
17
4
0
15 Jan 2021
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing
  Protocol
SpreadMeNot: A Provably Secure and Privacy-Preserving Contact Tracing Protocol
Pietro Tedeschi
S. Bakiras
Roberto Di Pietro
11
5
0
14 Nov 2020
Verifying Cryptographic Security Implementations in C Using Automated
  Model Extraction
Verifying Cryptographic Security Implementations in C Using Automated Model Extraction
Mihhail Aizatulin
11
2
0
03 Jan 2020
Formal Analysis of an E-Health Protocol
Formal Analysis of an E-Health Protocol
Naipeng Dong
H. Jonker
Jun Pang
13
2
0
25 Aug 2018
QRES: Quantitative Reasoning on Encrypted Security SLAs
QRES: Quantitative Reasoning on Encrypted Security SLAs
Ahmed Taha
Spyros Boukoros
Jesus Luna
Stefan Katzenbeisser
N. Suri
17
0
0
12 Apr 2018
Analysing and Patching SPEKE in ISO/IEC
Analysing and Patching SPEKE in ISO/IEC
Feng Hao
Roberto Metere
S. F. Shahandashti
Changyu Dong
19
11
0
14 Feb 2018
A Secure and Authenticated Key Management Protocol (SA-KMP) for
  Vehicular Networks
A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks
Hengchuan Tan
M. Ma
H. Labiod
Aymen Boudguiga
Jun Zhang
P. Chong
19
48
0
28 Dec 2017
Survey on Data-Centric based Routing Protocols for Wireless Sensor
  Networks
Survey on Data-Centric based Routing Protocols for Wireless Sensor Networks
K. A. Rasbi
Hothefa Shaker
Zeyad T. Sharef
14
6
0
11 May 2017
Automated verification of dynamic root of trust protocols (long version)
Automated verification of dynamic root of trust protocols (long version)
Sergiu Bursuc
Christian Johansen
Shiwei Xu
24
4
0
30 Jan 2017
The Applied Pi Calculus: Mobile Values, New Names, and Secure
  Communication
The Applied Pi Calculus: Mobile Values, New Names, and Secure Communication
M. Abadi
B. Blanchet
Cédric Fournet
28
95
0
10 Sep 2016
Discovering, quantifying, and displaying attacks
Discovering, quantifying, and displaying attacks
R. Vigo
F. Nielson
H. R. Nielson
23
4
0
26 Jul 2016
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols
A Semi-Decidable Procedure for Secrecy in Cryptographic Protocols
Jaouhar Fattahi
M. Mejri
H. Houmani
35
4
0
12 Aug 2014
Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems
Towards the Model-Driven Engineering of Secure yet Safe Embedded Systems
Ludovic Apvrille
Y. Roudier
45
22
0
08 Apr 2014
Extracting and Verifying Cryptographic Models from C Protocol Code by
  Symbolic Execution
Extracting and Verifying Cryptographic Models from C Protocol Code by Symbolic Execution
Mihhail Aizatulin
Andrew D. Gordon
Jan Jurjens
43
66
0
06 Jul 2011
Satisfiability of General Intruder Constraints with and without a Set
  Constructor
Satisfiability of General Intruder Constraints with and without a Set Constructor
Tigran Avanesov
Yannick Chevalier
M. Rusinowitch
Mathieu Turuani
63
6
0
01 Mar 2011
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn
  Theory Based Approach
Reducing Protocol Analysis with XOR to the XOR-free Case in the Horn Theory Based Approach
Ralf Küsters
Tomasz Truderung
98
77
0
05 Aug 2008
1