A Survey of Symbolic Methods in Computational Analysis of Cryptographic Systems

Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and probability. This approach captures a strong notion of security, guaranteed against all probabilistic polynomial-time at...

Full description

Saved in:
Bibliographic Details
Published in:Journal of automated reasoning Vol. 46; no. 3-4; pp. 225 - 259
Main Authors: Cortier, Véronique, Kremer, Steve, Warinschi, Bogdan
Format: Journal Article
Language:English
Published: Dordrecht Springer Netherlands 01.04.2011
Springer Nature B.V
Springer Verlag
Subjects:
ISSN:0168-7433, 1573-0670
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first