Symbolically analyzing security protocols using tamarin

  • Basin D
  • Cremers C
  • Dreier J
  • et al.
N/ACitations
Citations of this article
20Readers
Mendeley users who have this article in their library.

Abstract

During the last three decades, there has been considerable research devoted to the symbolic analysis of security protocols and existing tools have had considerable success both in detecting attacks on protocols and showing their absence. Nevertheless, there is still a large discrepancy between the symbolic models that one specifies on paper and the models that can be effectively analyzed by tools.

Cite

CITATION STYLE

APA

Basin, D., Cremers, C., Dreier, J., & Sasse, R. (2017). Symbolically analyzing security protocols using tamarin. ACM SIGLOG News, 4(4), 19–30. https://doi.org/10.1145/3157831.3157835

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free