Sciweavers

49
Voted
TACAS
2007
Springer
67views Algorithms» more  TACAS 2007»
15 years 2 months ago
Searching for Shapes in Cryptographic Protocols
Abstract. We describe a method for enumerating all essentially different executions possible for a cryptographic protocol. We call them the shapes of the protocol. Naturally occur...
Shaddin F. Doghmi, Joshua D. Guttman, F. Javier Th...