We consider arbitrary cryptographic protocols and security properties. We show that it is always sufficient to consider a bounded number of agents b (actually b = 2 in most of the cases): if there is an attack involving n agents, then there is an attack involving at most b agents. © Springer-Verlag Berlin Heidelberg 2003.
CITATION STYLE
Comon-Lundh, H., & Cortier, V. (2003). Security properties: Two agents are sufficient. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2618, 99–113. https://doi.org/10.1007/3-540-36575-3_8
Mendeley helps you to discover research relevant for your work.