Security properties: two agents are sufficient
From MaRDI portal
Publication:1887730
DOI10.1016/j.scico.2003.12.002zbMath1073.68028OpenAlexW1836114257WikidataQ115037039 ScholiaQ115037039MaRDI QIDQ1887730
Véronique Cortier, Hubert Comon-Lundh
Publication date: 22 November 2004
Published in: Science of Computer Programming (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.scico.2003.12.002
Related Items
Challenges in the Automated Verification of Security Protocols, Reducing protocol analysis with XOR to the XOR-free case in the Horn theory based approach, Rigid tree automata and applications, Safely Composing Security Protocols, Verification of Security Protocols with a Bounded Number of Sessions Based on Resolution for Rigid Variables, Comparing State Spaces in Automatic Security Protocol Analysis, Safely composing security protocols, Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif