From One Session to Many: Dynamic Tags for Security Protocols
From MaRDI portal
Publication:5505548
DOI10.1007/978-3-540-89439-1_9zbMath1182.68082OpenAlexW2157278388MaRDI QIDQ5505548
Steve Kremer, Stéphanie Delaune, Myrto Arapinis
Publication date: 27 January 2009
Published in: Logic for Programming, Artificial Intelligence, and Reasoning (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89439-1_9
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Network protocols (68M12)
Related Items (7)
The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols ⋮ Modular verification of protocol equivalence in the presence of randomness ⋮ Bounded memory Dolev-Yao adversaries in collaborative systems ⋮ Challenges in the Automated Verification of Security Protocols ⋮ Composition of password-based protocols ⋮ Safely composing security protocols ⋮ Bounded memory protocols
Uses Software
This page was built for publication: From One Session to Many: Dynamic Tags for Security Protocols