Back to Results
First PageMeta Content
Burrows–Abadi–Needham logic / Needham–Schroeder protocol / Communications protocol / Model theory / Quantifier elimination / Security protocol notation / Cryptographic protocols / Data / Information


A (restricted) quantifier elimination for security protocols ? R. Ramanujam ∗ The Institute of Mathematical Sciences, C.I.T. Campus, Taramani, Chennai[removed], India S.P. Suresh
Add to Reading List

Document Date: 2006-08-04 05:49:00


Open Document

File Size: 257,92 KB

Share Result on Facebook

Company

Needham / /

/

Facility

India S.P. Suresh Chennai Mathematical Institute / The Institute of Mathematical Sciences / C.I.T. Campus / /

IndustryTerm

tagged protocols / Verification tools / infinite state systems / present protocols / cryptographic tools / security protocol / reactive systems / security protocols / /

Organization

Institute of Mathematical Sciences / India S.P. Suresh Chennai Mathematical Institute / /

Person

Suresh Chennai / /

Position

restricted model for protocols / Private / Corresponding author / formal model for protocols / /

Product

t10 / /

PublishedMedium

Theoretical Computer Science / /

Technology

encryption / so-called tagged protocols / security protocol / private key / security protocols / public key / same protocol / directly present protocols / tagged protocol / modelling security protocols / /

SocialTag