Sciweavers

12 search results - page 3 / 3
» Relating Strands and Multiset Rewriting for Security Protoco...
Sort
View
ATVA
2006
Springer
160views Hardware» more  ATVA 2006»
13 years 9 months ago
Monotonic Set-Extended Prefix Rewriting and Verification of Recursive Ping-Pong Protocols
Ping-pong protocols with recursive definitions of agents, but without any active intruder, are a Turing powerful model. We show that under the environment sensitive semantics (i.e....
Giorgio Delzanno, Javier Esparza, Jirí Srba
LPAR
2005
Springer
13 years 10 months ago
Algebraic Intruder Deductions
Abstract. Many security protocols fundamentally depend on the algebraic properties of cryptographic operators. It is however difficult to handle these properties when formally anal...
David A. Basin, Sebastian Mödersheim, Luca Vi...