Modeling Adversaries in a Logic for Security Protocol Analysis
From MaRDI portal
Publication:2881088
DOI10.2168/LMCS-8(1:21)2012zbMath1238.94029OpenAlexW2762642064MaRDI QIDQ2881088
Riccardo Pucella, Joseph Y. Halpern
Publication date: 3 April 2012
Published in: Logical Methods in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.2168/lmcs-8(1:21)2012
Related Items (4)
Logics of Rational Interaction ⋮ To know or not to know: Epistemic approaches to security protocol verification ⋮ An omniscience-free temporal logic of knowledge for verifying authentication protocols ⋮ A Substructural Epistemic Resource Logic
Uses Software
This page was built for publication: Modeling Adversaries in a Logic for Security Protocol Analysis