Sciweavers

ESOP
2005
Springer
15 years 10 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
112
Voted
CADE
2001
Springer
16 years 5 months ago
SET Cardholder Registration: The Secrecy Proofs
Lawrence C. Paulson