Product programs and relational program logics. | 8 | 0.49 | 2016 |
Combining Mechanized Proofs and Model-Based Testing in the Formal Analysis of a Hypervisor. | 2 | 0.47 | 2016 |
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols. | 10 | 0.52 | 2015 |
Fully automated analysis of padding-based encryption in the computational model | 21 | 0.86 | 2013 |
Beyond 2-Safety: Asymmetric Product Programs for Relational Program Verification. | 24 | 0.72 | 2013 |
From relational verification to SIMD loop synthesis | 16 | 0.66 | 2013 |
Secure multi-execution through static program transformation | 15 | 0.53 | 2012 |
Automated Analysis and Synthesis of Padding-Based Encryption Schemes. | 0 | 0.34 | 2012 |
Computer-Aided Cryptographic Proofs. | 0 | 0.34 | 2012 |
Relational verification using product programs | 65 | 1.57 | 2011 |
A machine-checked framework for relational separation logic | 2 | 0.41 | 2011 |
A Framework for the Analysis of Access Control Models for Interactive Mobile Devices | 1 | 0.34 | 2008 |