Constraint solving for bounded-process cryptographic protocol analysis

Published: 2001, Last Modified: 30 Sept 2024CCS 2001EveryoneRevisionsBibTeXCC BY-SA 4.0
Abstract: The reachability problem for cryptographic protocols with non-atomic keys can be solved via a simple constraint satisfaction procedure.
Loading