Attacking Fair-Exchange Protocols

Electronic Notes in Theoretical Computer Science(2003)

引用 0|浏览28
暂无评分
摘要
Most approaches to formal protocol verification rely on an operational model based on traces of atomic actions. Modulo CSP, CCS, state-exploration, Higher Order Logic or strand spaces frills, authentication or secrecy are analyzed by looking at the existence or the absence of traces with a suitable property.
更多
查看译文
关键词
higher order logic,key exchange,trusted third party
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要