Sciweavers

ASIAN
2006
Springer
133views Algorithms» more  ASIAN 2006»
14 years 3 months ago
Normal Proofs in Intruder Theories
Given an arbitrary intruder deduction capability, modeled as an inference system S and a protocol, we show how to compute an inference system bS such that the security problem for ...
Vincent Bernat, Hubert Comon-Lundh