Security properties: two agents are sufficient
From MaRDI portal
Publication:1887730
DOI10.1016/j.scico.2003.12.002zbMath1073.68028OpenAlexW1836114257WikidataQ115037039 ScholiaQ115037039MaRDI QIDQ1887730
Véronique Cortier, Hubert Comon-Lundh
Publication date: 22 November 2004
Published in: Science of Computer Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.scico.2003.12.002
Related Items
Challenges in the Automated Verification of Security Protocols ⋮ Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach ⋮ Rigid tree automata and applications ⋮ Safely Composing Security Protocols ⋮ Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables ⋮ Comparing State Spaces in Automatic Security Protocol Analysis ⋮ Safely composing security protocols ⋮ Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif