Filters








2 Hits in 6.4 sec

Automated verification of selected equivalences for security protocols

Bruno Blanchet, Martín Abadi, Cédric Fournet
2008 The Journal of Logic and Algebraic Programming  
We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif. * A preliminary version of this work was presented at the 20th IEEE Symposium on Logic in Computer  ...  In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools.  ...  Martín Abadi's work was partly supported by the National Science Foundation under Grants CCR-0204162, CCR-0208800, and CCF-0524078.  ... 
doi:10.1016/j.jlap.2007.06.002 fatcat:nmycjrfkorb2romaxbptsj3eea

Automated Verification of Selected Equivalences for Security Protocols

B. Blanchet, M. Abadi, C. Fournet
20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05)  
We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif. * A preliminary version of this work was presented at the 20th IEEE Symposium on Logic in Computer  ...  In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools.  ...  Martín Abadi's work was partly supported by the National Science Foundation under Grants CCR-0204162, CCR-0208800, and CCF-0524078.  ... 
doi:10.1109/lics.2005.8 dblp:conf/lics/BlanchetAF05 fatcat:i3g2rwcltjanzhpm6h4rihtcnu