Sciweavers

CCS
2001
ACM

Constraint solving for bounded-process cryptographic protocol analysis

13 years 8 months ago
Constraint solving for bounded-process cryptographic protocol analysis
The reachability problem for cryptographic protocols with nonatomic keys can be solved via a simple constraint satisfaction procedure.
Jonathan K. Millen, Vitaly Shmatikov
Added 28 Jul 2010
Updated 28 Jul 2010
Type Conference
Year 2001
Where CCS
Authors Jonathan K. Millen, Vitaly Shmatikov
Comments (0)