Attacking Fair-Exchange Protocols

Electronic Notes in Theoretical Computer Science, pp. 51-68, 2003.

Cited by: 0|Bibtex|Views5|DOI:https://doi.org/10.1016/S1571-0661(04)00244-0
EI
Other Links: academic.microsoft.com|www.sciencedirect.com

Abstract:

Most approaches to formal protocol verification rely on an operational model based on traces of atomic actions. Modulo CSP, CCS, state-exploration, Higher Order Logic or strand spaces frills, authentication or secrecy are analyzed by looking at the existence or the absence of traces with a suitable property.

Code:

Data:

Your rating :
0

 

Tags
Comments