Deciding security properties for cryptographic protocols. application to key cycles

@article{ComonLundh2010DecidingSP,
  title={Deciding security properties for cryptographic protocols. application to key cycles},
  author={Hubert Comon-Lundh and V{\'e}ronique Cortier and Eugen Zalinescu},
  journal={ACM Trans. Comput. Log.},
  year={2010},
  volume={11},
  pages={9:1-9:42}
}
There is a large amount of work dedicated to the formal verification of security protocols. In this article, we revisit and extend the NP-complete decision procedure for a bounded number of sessions. We use a, now standard, deducibility constraint formalism for modeling security protocols. Our first contribution is to give a simple set of constraint… CONTINUE READING

2 Figures & Tables

Topics

Statistics

05101520082009201020112012201320142015201620172018
Citations per Year

65 Citations

Semantic Scholar estimates that this publication has 65 citations based on the available data.

See our FAQ for additional information.