A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Automated verification of selected equivalences for security protocols
2008
The Journal of Logic and Algebraic Programming
We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif. * A preliminary version of this work was presented at the 20th IEEE Symposium on Logic in Computer ...
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. ...
Martín Abadi's work was partly supported by the National Science Foundation under Grants CCR-0204162, CCR-0208800, and CCF-0524078. ...
doi:10.1016/j.jlap.2007.06.002
fatcat:nmycjrfkorb2romaxbptsj3eea
Automated Verification of Selected Equivalences for Security Protocols
20th Annual IEEE Symposium on Logic in Computer Science (LICS' 05)
We develop our techniques in the context of the applied pi calculus and implement them in the tool ProVerif. * A preliminary version of this work was presented at the 20th IEEE Symposium on Logic in Computer ...
In the analysis of security protocols, methods and tools for reasoning about protocol behaviors have been quite effective. We aim to expand the scope of those methods and tools. ...
Martín Abadi's work was partly supported by the National Science Foundation under Grants CCR-0204162, CCR-0208800, and CCF-0524078. ...
doi:10.1109/lics.2005.8
dblp:conf/lics/BlanchetAF05
fatcat:i3g2rwcltjanzhpm6h4rihtcnu