Towards a completeness result for model checking of security protocols
- 1 April 1999
- journal article
- Published by SAGE Publications in Journal of Computer Security
- Vol. 7 (2-3) , 89-146
- https://doi.org/10.3233/jcs-1999-72-302
Abstract
Model checking approaches to the analysis of security protocols have proved remarkably successful. The basic approach is to produce a model of a small system running the protocol, together with a model of the most general intruder who can interact wiKeywords
This publication has 0 references indexed in Scilit: