Login / Signup

On the representation and verification of cryptographic protocols in a theory of action.

James P. DelgrandeAaron HunterTorsten Grote
Published in: PST (2010)
Keyphrases
  • cryptographic protocols
  • security properties
  • standard model
  • security protocols
  • real time
  • image representation
  • formal verification
  • high dimensional
  • encryption decryption