As a guest user you are not logged in or recognized by your IP address. You have
access to the Front Matter, Abstracts, Author Index, Subject Index and the full
text of Open Access publications.
Cryptographic protocols are mandatory for garateeing security properties of open systems that communicate with their environment. The study of the semantic models and the algorithmic verification of these protocols is a chalenging and fascinating research topic that combines the theory of program and system semantics, automata theory, rewriting theory, logics and their decision problems, cryptography, complexity theory, ….
In this paper, we present some of the results developed at VERIMAG for the automatic verification of cryptographic protocols.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.
This website uses cookies
We use cookies to provide you with the best possible experience. They also allow us to analyze user behavior in order to constantly improve the website for you. Info about the privacy policy of IOS Press.