Constraint differentiation: A new reduction technique for constraint-based analysis of security protocols

Open access
Date
2003Type
- Report
ETH Bibliography
yes
Altmetrics
Permanent link
https://doi.org/10.3929/ethz-a-006666073Publication status
publishedJournal / series
Technical Report / ETH Zurich, Department of Computer ScienceVolume
Publisher
ETH, Eidgenössische Technische Hochschule Zürich, Information Security GroupSubject
VERIFICATION (SOFTWARE ENGINEERING); DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); NETWORK PROTOCOLS + COMMUNICATION PROTOCOLS (COMPUTER SYSTEMS); NETZWERKPROTOKOLLE + KOMMUNIKATIONSPROTOKOLLE (COMPUTERSYSTEME); VERIFIKATION (SOFTWARE ENGINEERING); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)Organisational unit
02150 - Dep. Informatik / Dep. of Computer Science
Notes
Technical Reports D-INFK.More
Show all metadata
ETH Bibliography
yes
Altmetrics