ACM Transactions on Computer Systems (TOCS)
A process specification formalism
Fundamenta Informaticae
Branching time and abstraction in bisimulation semantics
Journal of the ACM (JACM)
Confluence for process verification
Theoretical Computer Science
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Athena: a novel approach to efficient automatic security protocol analysis
Journal of Computer Security
Constraint solving for bounded-process cryptographic protocol analysis
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Communication and Concurrency
Interactive Visualization of State Transition Systems
IEEE Transactions on Visualization and Computer Graphics
Proceedings of the IFIP WG6.1 Fifth International Conference on Protocol Specification, Testing and Verification V
Breaking and Fixing the Needham-Schroeder Public-Key Protocol Using FDR
TACAs '96 Proceedings of the Second International Workshop on Tools and Algorithms for Construction and Analysis of Systems
Regularity of BPA-Systems is Decidable
CONCUR '94 Proceedings of the Concurrency Theory
JITty: A Rewriter with Strategy Annotations
RTA '02 Proceedings of the 13th International Conference on Rewriting Techniques and Applications
State Space Reduction by Proving Confluence
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
CVC: A Cooperating Validity Checker
CAV '02 Proceedings of the 14th International Conference on Computer Aided Verification
Verification Tools for Finite-State Concurrent Systems
A Decade of Concurrency, Reflections and Perspectives, REX School/Symposium
A Hierarchy of Authentication Specifications
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Automated analysis of cryptographic protocols using Mur/spl phi/
SP '97 Proceedings of the 1997 IEEE Symposium on Security and Privacy
Spin model checker, the: primer and reference manual
Spin model checker, the: primer and reference manual
The modelling and analysis of security protocols: the csp approach
The modelling and analysis of security protocols: the csp approach
A framework for automatically checking anonymity with µCRL
TGC'06 Proceedings of the 2nd international conference on Trustworthy global computing
Design and formal verification of a CEM protocol with transparent TTP
Frontiers of Computer Science: Selected Publications from Chinese Universities
Hi-index | 0.00 |
The @mCRL language and its corresponding tool set form a powerful methodology for the verification of distributed systems. We demonstrate its use by applying it to the well-known Bilateral Key Exchange security protocol.