From One Session to Many: Dynamic Tags for Security Protocols
From MaRDI portal
Publication:5505548
DOI10.1007/978-3-540-89439-1_9zbMath1182.68082MaRDI QIDQ5505548
Steve Kremer, Stéphanie Delaune, Myrto Arapinis
Publication date: 27 January 2009
Published in: Logic for Programming, Artificial Intelligence, and Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89439-1_9
Related Items
Bounded memory Dolev-Yao adversaries in collaborative systems, Safely composing security protocols, Modular verification of protocol equivalence in the presence of randomness, Composition of password-based protocols, Bounded memory protocols, The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols, Challenges in the Automated Verification of Security Protocols
Uses Software