Security Protocol Verification: Symbolic and Computational Models
From MaRDI portal
Publication:2894308
DOI10.1007/978-3-642-28641-4_2zbMath1297.68072OpenAlexW42122073MaRDI QIDQ2894308
Publication date: 29 June 2012
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-28641-4_2
Related Items (5)
A tutorial-style introduction to \(\mathsf{DY}^{\star}\) ⋮ Automated analysis of cryptographic assumptions in generic group models ⋮ Unnamed Item ⋮ Automated type-based analysis of injective agreement in the presence of compromised principals ⋮ Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
Uses Software
This page was built for publication: Security Protocol Verification: Symbolic and Computational Models