Sciweavers

119
Voted
ESOP
2005
Springer
15 years 9 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
103
Voted
CADE
2001
Springer
16 years 3 months ago
SET Cardholder Registration: The Secrecy Proofs
Lawrence C. Paulson