M Carbone, JD Guttman - Principles of Security and Trust: Second …, 2013 - Springer
Despite much work on sessions and session types in non-adversarial contexts, session-like behavior given an active adversary has not received an adequate definition and proof …
D Hutter, R Monroy - arXiv preprint arXiv:1308.1888, 2013 - arxiv.org
In this paper, we introduce a mechanism that aims to speed up the development cycle of security protocols, by adding automated aid for diagnosis and repair. Our mechanism relies …