Abstract
Symbolic models for security protocol verification were pioneered by Dolev and Yao in their seminal work. Since then, although inspired by the same ideas, many variants of the original model were developed. In particular, a common assumption is that
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have