AVISPA (Automated Validation of Internet Security Protocols and Applications) is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques.

References in zbMATH (referenced in 77 articles , 1 standard article )

Showing results 1 to 20 of 77.
Sorted by year (citations)

1 2 3 4 next

  1. Abadi, Martín; Blanchet, Bruno; Fournet, Cédric: The applied pi calculus, mobile values, new names, and secure communication (2018)
  2. Basin, David; Cremers, Cas; Meadows, Catherine: Model checking security protocols (2018)
  3. Parne, Balu L.; Gupta, Shubham; Chaudhari, Narendra S.: ESAP: efficient and secure authentication protocol for roaming user in mobile communication networks (2018)
  4. Baelde, David; Delaune, Stéphanie; Hirschi, Lucca: A reduced semantics for deciding trace equivalence (2017)
  5. Cheval, Vincent; Comon-Lundh, Hubert; Delaune, Stéphanie: A procedure for deciding symbolic equivalence between sets of constraint systems (2017)
  6. Kassem, Ali; Falcone, Yliès; Lafourcade, Pascal: Formal analysis and offline monitoring of electronic exams (2017)
  7. Chadha, Rohit; Cheval, Vincent; Ciob^acă, Ştefan; Kremer, Steve: Automated verification of equivalence properties of cryptographic protocols (2016)
  8. Genet, Thomas: Termination criteria for tree automata completion (2016)
  9. Ventura, D.; Gómez-Goiri, Aitor; Catania, V.; López-de-Ipiña, Diego; Naranjo, J. A. M.; Casado, L. G.: Security analysis and resource requirements of group-oriented user access control for hardware-constrained wireless network services (2016)
  10. Basin, David; Keller, Michel; Radomirović, Saša; Sasse, Ralf: Alice and Bob meet equational theories (2015)
  11. Meadows, Catherine: Emerging issues and trends in formal methods in cryptographic protocol analysis: twelve years later (2015)
  12. Sattarzadeh, Behnam; Fallah, Mehran S.: Automated type-based analysis of injective agreement in the presence of compromised principals (2015)
  13. Arapinis, Myrto; Delaune, Stéphanie; Kremer, Steve: Dynamic tags for security protocols (2014)
  14. Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie: Modeling and verifying ad hoc routing protocols (2014)
  15. Blanchet, Bruno: Automatic verification of security protocols in the symbolic model: the verifier proverif (2014)
  16. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA: a generic tool for computing intruder knowledge (2013)
  17. Chevalier, Céline; Delaune, Stéphanie; Kremer, Steve; Ryan, Mark D.: Composition of password-based protocols (2013)
  18. Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie: Deciding equivalence-based properties using constraint solving (2013)
  19. Ciob^acă, Ştefan; Delaune, Stéphanie; Kremer, Steve: Computing knowledge in security protocols under convergent equational theories (2012)
  20. Luu, Anh Tuan; Sun, Jun; Liu, Yang; Dong, Jin Song: SeVe: automatic tool for verification of security protocols (2012)

1 2 3 4 next