Bounding Messages for Free in Security Protocols
From MaRDI portal
Publication:5458850
DOI10.1007/978-3-540-77050-3_31zbMath1135.68389OpenAlexW1501813649MaRDI QIDQ5458850
Publication date: 24 April 2008
Published in: FSTTCS 2007: Foundations of Software Technology and Theoretical Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77050-3_31
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items
Bounded memory Dolev-Yao adversaries in collaborative systems ⋮ Bounding messages for free in security protocols -- extension to various security properties ⋮ Satisfiability of general intruder constraints with and without a set constructor ⋮ Composition of password-based protocols ⋮ Bounding Messages for Free in Security Protocols ⋮ Safely composing security protocols ⋮ Automatic Verification of Security Protocols in the Symbolic Model: The Verifier ProVerif
Cites Work
- Verification of cryptographic protocols: tagging enforces termination
- Tree automata with one memory set constraints and cryptographic protocols
- FST TCS 2003: Foundations of Software Technology and Theoretical Computer Science
- Computer Science Logic
- Deciding Key Cycles for Security Protocols
- Safely Composing Security Protocols
- Bounding Messages for Free in Security Protocols
- Unnamed Item