To infinity and beyond or, avoiding the infinite in security protocol analysis
Tools
Heather, J and Schneider, S (2006) To infinity and beyond or, avoiding the infinite in security protocol analysis
![]() |
Text
infinite-sets.pdf - ["content_typename_Accepted version (post-print)" not defined] Restricted to Repository staff only Download (134kB) |
Abstract
We investigate conditions under which an infinite set of atomic messages can be replaced with one or two values without affecting the correctness of a security protocol. The work is conducted using the strand spaces formalism, but the results apply to all protocol analysis techniques, and should be of particular value to those using model checking. The implications of the central result are discussed. Copyright 2006 ACM.
Item Type: | Conference or Workshop Item (UNSPECIFIED) |
---|---|
Divisions : | Surrey research (other units) |
Authors : | Heather, J and Schneider, S |
Date : | 2006 |
Depositing User : | Symplectic Elements |
Date Deposited : | 28 Mar 2017 13:26 |
Last Modified : | 23 Jan 2020 13:03 |
URI: | http://epubs.surrey.ac.uk/id/eprint/804611 |
Actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year