Security Properties: Two Agents Are Sufficient
- 28 February 2003
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 20 references indexed in Scilit:
- An efficient cryptographic protocol verifier based on prolog rulesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Proving secrecy is easy enoughPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2005
- Pattern-Based Abstraction for Verifying Secrecy in ProtocolsPublished by Springer Nature ,2003
- On Name Generation and Set-Based Analysis in the Dolev-Yao ModelPublished by Springer Nature ,2002
- Tree Automata with One Memory, Set Constraints, and Ping-Pong ProtocolsPublished by Springer Nature ,2001
- Computing symbolic models for verifying cryptographic protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2001
- On the Reachability Problem in Cryptographic ProtocolsPublished by Springer Nature ,2000
- Automatic recognition of tractability in inference relationsJournal of the ACM, 1993
- A transformational approach to negation in logic programmingThe Journal of Logic Programming, 1990
- On the security of multi-party ping-pong protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1983