Automated type-based analysis of injective agreement in the presence of compromised principals
From MaRDI portal
Publication:492914
DOI10.1016/j.jlamp.2015.06.002zbMath1337.68193WikidataQ114159207 ScholiaQ114159207MaRDI QIDQ492914
Behnam Sattarzadeh, Mehran S. Fallah
Publication date: 21 August 2015
Published in: Journal of Logical and Algebraic Methods in Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.jlamp.2015.06.002
static analysis; type reconstruction; authentication protocols; compromised principals; injective agreement
68Q85: Models and methods for concurrent and distributed computing (process algebras, bisimulation, transition nets, etc.)
68M12: Network protocols
94A62: Authentication, digital signatures and secret sharing
Uses Software