Rohit Chadha
Cited by
Cited by
Automated verification of equivalence properties of cryptographic protocols
R Chadha, V Cheval, Ş Ciobâcă, S Kremer
ACM Transactions on Computational Logic (TOCL) 17 (4), 1-32, 2016
Inductive methods and contract-signing protocols
R Chadha, M Kanovich, A Scedrov
Proceedings of the 8th ACM Conference on Computer and Communications …, 2001
Formal analysis of multiparty contract signing
R Chadha, S Kremer, A Scedrov
Journal of Automated Reasoning 36 (1-2), 39-83, 2006
A counterexample-guided abstraction-refinement framework for Markov decision processes
R Chadha, M Viswanathan
ACM Transactions on Computational Logic (TOCL) 12 (1), 1-49, 2010
Reasoning about imperative quantum programs
R Chadha, P Mateus, A Sernadas
Electronic Notes in Theoretical Computer Science 158, 19-39, 2006
Epistemic logic for the applied pi calculus
R Chadha, S Delaune, S Kremer
Formal Techniques for Distributed Systems: Joint 11th IFIP WG 6.1 …, 2009
Reasoning about probabilistic sequential programs
R Chadha, L Cruz-Filipe, P Mateus, A Sernadas
Theoretical Computer Science 379 (1-2), 142-165, 2007
Contract signing, optimism, and advantage
R Chadha, JC Mitchell, A Scedrov, V Shmatikov
CONCUR 2003-Concurrency Theory: 14th International Conference, Marseille …, 2003
Power of randomization in automata on infinite strings
R Chadha, AP Sistla, M Viswanathan
CONCUR 2009-Concurrency Theory: 20th International Conference, CONCUR 2009 …, 2009
Quantum computation tree logic—model checking and complete calculus
P Baltazar, R Chadha, P Mateus
International Journal of Quantum Information 6 (02), 219-236, 2008
Decidability results for well-structured transition systems with auxiliary storage
R Chadha, M Viswanathan
CONCUR 2007–Concurrency Theory: 18th International Conference, CONCUR 2007 …, 2007
On the expressiveness and complexity of randomization in finite state monitors
R Chadha, AP Sistla, M Viswanathan
Journal of the ACM (JACM) 56 (5), 1-44, 2009
A hybrid intuitionistic logic: Semantics and decidability
R Chadha, D Macedonio, V Sassone
Journal of Logic and Computation 16 (1), 27-59, 2006
Extending classical logic for reasoning about quantum systems
R Chadha, P Mateus, A Sernadas, C Sernadas
Handbook of Quantum Logic and Quantum Structures: Quantum Logic, 325-372, 2009
Deciding differential privacy for programs with finite inputs and outputs
G Barthe, R Chadha, V Jagannath, AP Sistla, M Viswanathan
Proceedings of the 35th Annual ACM/IEEE Symposium on Logic in Computer …, 2020
Reachability under contextual locking
R Chadha, P Madhusudan, M Viswanathan
Tools and Algorithms for the Construction and Analysis of Systems: 18th …, 2012
Model checking MDPs with a unique compact invariant set of distributions
R Chadha, VA Korthikanti, M Viswanathan, G Agha, YM Kwon
2011 Eighth International Conference on Quantitative Evaluation of SysTems …, 2011
Verification of randomized security protocols
R Chadha, AP Sistla, M Viswanathan
2017 32nd Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), 1-12, 2017
Verification methods for the computationally complete symbolic attacker based on indistinguishability
G Bana, R Chadha, AK Eeralla, M Okada
ACM Transactions on Computational Logic (TOCL) 21 (1), 1-44, 2019
Formal analysis of vote privacy using computationally complete symbolic attacker
G Bana, R Chadha, AK Eeralla
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
The system can't perform the operation now. Try again later.
Articles 1–20