Publication | Open Access
Symbolically analyzing security protocols using tamarin
44
Citations
23
References
2017
Year
EngineeringInformation SecurityVerificationSecurity EvaluationSymbolic AnalysisCryptographic ProtocolSoftware AnalysisFormal VerificationSecurity ModellingSymbolic ModelsSecurity ProtocolsSecure ProtocolSecure By DesignComputer ScienceData SecurityCryptographyProgram AnalysisFormal MethodsComputer Security Model
During the last three decades, there has been considerable research devoted to the symbolic analysis of security protocols and existing tools have had considerable success both in detecting attacks on protocols and showing their absence. Nevertheless, there is still a large discrepancy between the symbolic models that one specifies on paper and the models that can be effectively analyzed by tools.
| Year | Citations | |
|---|---|---|
Page 1
Page 1