Abstract
First-order logic models of security for cryptographic protocols, based on variants of the Dolev-Yao model, are now well-established tools. Given that we have checked a given security protocol usin...
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have