Attacking fair-exchange protocols: parallel models vs trace models

Electr. Notes Theor. Comput. Sci., pp. 51-68, 2001.

Cited by: 1|Bibtex|Views2
EI
Other Links: dblp.uni-trier.de|academic.microsoft.com

Abstract:

Most approaches to formal protocol veriÞcation rely on an operational model based on traces of atomic actions. Modulo CSP, CCS, state-exploration, Higher Order Logic or strand spaces frills, authentication or secrecy are analyzed by looking at the existence or the absence of traces with a suitable property. We introduced an alternative op...More

Code:

Data:

Your rating :
0

 

Tags
Comments