Martin Grimeland

Learn More
This paper investigates the suitability of applying the general-purpose real-time Maude tool to the formal specification and model checking analysis of time-dependent cryptographic protocols. We restrict the intruders so that they become non-Zeno, and propose a complete analysis method for finding attacks that are reachable from the initial state. Our(More)
  • 1