Constraint solving for bounded-process cryptographic protocol analysis

  • Authors:
  • Jonathan Millen;Vitaly Shmatikov

  • Affiliations:
  • SRI International, Menlo Park, CA;SRI International, Menlo Park, CA

  • Venue:
  • CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
  • Year:
  • 2001

Quantified Score

Hi-index 0.01

Visualization

Abstract

The reachability problem for cryptographic protocols with non-atomic keys can be solved via a simple constraint satisfaction procedure.