During the last three decades, there has been considerable research devoted to the symbolic analysis of security protocols and existing tools have had considerable success both in detecting attacks on protocols and showing their absence. Nevertheless, there is still a large discrepancy between the symbolic models that one specifies on paper and the models that can be effectively analyzed by tools.
CITATION STYLE
Basin, D., Cremers, C., Dreier, J., & Sasse, R. (2017). Symbolically analyzing security protocols using tamarin. ACM SIGLOG News, 4(4), 19–30. https://doi.org/10.1145/3157831.3157835
Mendeley helps you to discover research relevant for your work.