iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1766
About models of security protocols

About models of security protocols

Author Hubert Comon-Lundh



PDF
Thumbnail PDF

File

LIPIcs.FSTTCS.2008.1766.pdf
  • Filesize: 427 kB
  • 5 pages

Document Identifiers

Author Details

Hubert Comon-Lundh

Cite As Get BibTex

Hubert Comon-Lundh. About models of security protocols. In IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science. Leibniz International Proceedings in Informatics (LIPIcs), Volume 2, pp. 352-356, Schloss Dagstuhl – Leibniz-Zentrum für Informatik (2008) https://doi.org/10.4230/LIPIcs.FSTTCS.2008.1766

Abstract

In this paper, mostly consisting of definitions, we revisit the models
of security protocols: we show that the symbolic and the computational
models (as well as others) are instances of a same generic model.  Our
definitions are also parametrized by the security primitives, the
notion of attacker and, to some extent, the process calculus.

Subject Classification

Keywords
  • Protocols
  • security
  • concurrency
  • formal methods

Metrics

  • Access Statistics
  • Total Accesses (updated on a weekly basis)
    0
    PDF Downloads
Questions / Remarks / Feedback
X

Feedback for Dagstuhl Publishing


Thanks for your feedback!

Feedback submitted

Could not send message

Please try again later or send an E-mail