Dynamic Tags for Security Protocols

The design and verification of cryptographic protocols is a notoriously difficult task, even in symbolic models which take an abstract view of cryptography. This is mainly due to the fact that protocols may interact with an arbitrary attacker which yields a verification problem that has several sour...

Full description

Bibliographic Details
Main Authors: Myrto Arapinis, Stéphanie Delaune, Steve Kremer
Format: Article
Language:English
Published: Logical Methods in Computer Science e.V. 2014-06-01
Series:Logical Methods in Computer Science
Subjects:
Online Access:https://lmcs.episciences.org/690/pdf