Abstract
A panel discussion on related approaches to cryptographic protocol analysis is presented. The protocol analysis is based on a model of adversary capabilities that allows nondeterminstic choice of possible actions. Basic assumptions of the model provides an idealized setting for relatively tractable protocol analysis.
Original language | English |
---|---|
Pages (from-to) | 111 |
Number of pages | 1 |
Journal | Proceedings of the Computer Security Foundations Workshop |
State | Published - 2001 |
Externally published | Yes |
Event | 14th IEEE Computer Security Foundations Workshop (CSFW-14) - Cape Brenton, NS, United States Duration: 11 Jun 2001 → 13 Jun 2001 |