Abstract
During the last three decades, there has been considerable research devoted to the symbolic analysis of security protocols and existing tools have had considerable success both in detecting attacks on protocols and showing their absence. Nevertheless, there is still a large discrepancy between the symbolic models that one specifies on paper and the models that can be effectively analyzed by tools.
Cite
CITATION STYLE
APA
Basin, D., Cremers, C., Dreier, J., & Sasse, R. (2017). Symbolically analyzing security protocols using tamarin. ACM SIGLOG News, 4(4), 19–30. https://doi.org/10.1145/3157831.3157835
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.
Already have an account? Sign in
Sign up for free