Security properties: two agents are sufficient
From MaRDI portal
Publication:1887730
DOI10.1016/j.scico.2003.12.002zbMath1073.68028WikidataQ115037039 ScholiaQ115037039MaRDI QIDQ1887730
Véronique Cortier, Hubert Comon-Lundh
Publication date: 22 November 2004
Published in: Science of Computer Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.scico.2003.12.002
68P25: Data encryption (aspects in computer science)
Related Items
Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif, Safely Composing Security Protocols, Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach, Rigid tree automata and applications, Safely composing security protocols, Challenges in the Automated Verification of Security Protocols, Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables, Comparing State Spaces in Automatic Security Protocol Analysis