Login / Signup
Rewriting for Cryptographic Protocol Verification.
Thomas Genet
Francis Klay
Published in:
CADE (2000)
Keyphrases
</>
cryptographic protocols
standard model
security properties
conjunctive queries
security protocols
rewriting rules
insider attacks
rewrite rules
encryption decryption
query rewriting
information systems
database systems
similarity measure
authentication protocol