Composition of password-based protocols

C Chevalier, S Delaune, S Kremer… - Formal Methods in System …, 2013 - Springer
Formal and symbolic techniques are extremely useful for modelling and analysing security
protocols. They have helped to improve our understanding of such protocols, allowed us to …

Sessions and separability in security protocols

M Carbone, JD Guttman - Principles of Security and Trust: Second …, 2013 - Springer
Despite much work on sessions and session types in non-adversarial contexts, session-like
behavior given an active adversary has not received an adequate definition and proof …

Strand-Based Approach to Patch Security Protocols

D Hutter, R Monroy - arXiv preprint arXiv:1308.1888, 2013 - arxiv.org
In this paper, we introduce a mechanism that aims to speed up the development cycle of
security protocols, by adding automated aid for diagnosis and repair. Our mechanism relies …

[引用][C] Extension d'un langage de description des protocoles de sécurité et traduction vers une algèbre de réseaux de Petri

F Pommereau, F Gava