Attacking fair-exchange protocols: parallel models vs trace models
Electr. Notes Theor. Comput. Sci., pp. 51-68, 2001.
EI
Abstract:
Most approaches to formal protocol veriÞcation rely on an operational model based on traces of atomic actions. Modulo CSP, CCS, state-exploration, Higher Order Logic or strand spaces frills, authentication or secrecy are analyzed by looking at the existence or the absence of traces with a suitable property. We introduced an alternative op...More
Code:
Data:
Tags
Comments