Cited By
View all- Bhargavan KBichhawat AHosseyni PKüsters RPruiksma KSchmitz GWaldmann CWürtele T(2024)Layered Symbolic Security Analysis in $$\textsf {DY}^\star $$Computer Security – ESORICS 202310.1007/978-3-031-51479-1_1(3-21)Online publication date: 12-Jan-2024
- Arquint LWolf FLallemand JSasse RSprenger CWiesner SBasin DMüller P(2023)Sound Verification of Security Protocols: From Design to Interoperable Implementations2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179325(1077-1093)Online publication date: May-2023
- Ho SProtzenko JBichhawat ABhargavan K(2022)Noise: A Library of Verified High-Performance Secure Channel Protocol Implementations2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833621(107-124)Online publication date: May-2022
- Show More Cited By