Login / Signup
Verification of cryptographic protocols: tagging enforces termination.
Bruno Blanchet
Andreas Podelski
Published in:
Theor. Comput. Sci. (2005)
Keyphrases
</>
cryptographic protocols
standard model
security properties
security protocols
metadata
authentication protocol
formal verification
real time
similarity measure
response time
encryption decryption
private information retrieval