2005
DOI: 10.1007/s10009-005-0189-6
|View full text |Cite
|
Sign up to set email alerts
|

Pattern-based abstraction for verifying secrecy in protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2005
2005
2012
2012

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…This proves actually that the instanciation techniques in [19] are complete. This also provides completeness results for abstraction used in [6,23]. Of course, the verification problem will remain undecidable, because we cannot faithfully give a bound on the number of sessions.…”
Section: Introductionmentioning
confidence: 97%
See 2 more Smart Citations
“…This proves actually that the instanciation techniques in [19] are complete. This also provides completeness results for abstraction used in [6,23]. Of course, the verification problem will remain undecidable, because we cannot faithfully give a bound on the number of sessions.…”
Section: Introductionmentioning
confidence: 97%
“…Yet another solution is to consider an upper approximation of the set of execution sequences, in such a way that, when no attack is found on this upper approximation, then there is no attack on the protocol. This is typically the approach of [6,5].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation