AVISPA

AVISPA (Automated Validation of Internet Security Protocols and Applications) is a push-button tool for the automated validation of Internet security-sensitive protocols and applications. It provides a modular and expressive formal language for specifying protocols and their security properties, and integrates different back-ends that implement a variety of state-of-the-art automatic analysis techniques.


References in zbMATH (referenced in 67 articles , 1 standard article )

Showing results 1 to 20 of 67.
Sorted by year (citations)

1 2 3 4 next

  1. Sattarzadeh, Behnam; Fallah, Mehran S.: Automated type-based analysis of injective agreement in the presence of compromised principals (2015)
  2. Arapinis, Myrto; Delaune, Stéphanie; Kremer, Steve: Dynamic tags for security protocols (2014)
  3. Arnaud, Mathilde; Cortier, Véronique; Delaune, Stéphanie: Modeling and verifying ad hoc routing protocols (2014)
  4. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA, A generic tool for computing intruder knowledge (2013)
  5. Chevalier, Céline; Delaune, Stéphanie; Kremer, Steve; Ryan, Mark D.: Composition of password-based protocols (2013)
  6. Cheval, Vincent; Cortier, Véronique; Delaune, Stéphanie: Deciding equivalence-based properties using constraint solving (2013)
  7. Ciob^acă, Ştefan; Delaune, Stéphanie; Kremer, Steve: Computing knowledge in security protocols under convergent equational theories (2012)
  8. Luu, Anh Tuan; Sun, Jun; Liu, Yang; Dong, Jin Song: SeVe: automatic tool for verification of security protocols (2012)
  9. Arsac, Wihem; Bella, Giampaolo; Chantry, Xavier; Compagna, Luca: Multi-attacker protocol validation (2011)
  10. Basin, David; Caleiro, Carlos; Ramos, Jaime; Viganò, Luca: Distributed temporal logic for the analysis of security protocol models (2011)
  11. Berrima, Mouhebeddine; Ben Rajeb, Narjes; Cortier, Véronique: Deciding knowledge in security protocols under some e-voting theories (2011)
  12. Colvin, Robert J.; Hayes, Ian J.: A semantics for behavior trees using CSP with specification commands (2011)
  13. Focardi, Riccardo; Luccio, Flaminia L.; Steel, Graham: An introduction to security API analysis (2011)
  14. Chevalier, Yannick; Rusinowitch, Michael: Symbolic protocol analysis in the union of disjoint intruder theories: combining decision procedures (2010)
  15. Islam, Salekul; Atwood, J.William: Sender access and data distribution control for inter-domain multicast groups (2010)
  16. Mohammadi-Nodooshan, A.; Darmani, Y.; Jalili, R.; Nourani, M.; Haghighi, M.Sayad: A robust and efficient SIP authentication scheme (2010)
  17. Armando, Alessandro; Carbone, Roberto; Compagna, Luca: LTL model checking for security protocols (2009)
  18. Arora, Charu; Turuani, Mathieu: Validating integrity for the ephemerizer’s protocol with CL-Atse (2009)
  19. Arsac, Wihem; Bella, Giampaolo; Chantry, Xavier; Compagna, Luca: Validating security protocols under the general attacker (2009)
  20. Baudet, Mathieu; Cortier, Véronique; Delaune, Stéphanie: YAPA: a generic tool for computing intruder knowledge (2009)

1 2 3 4 next