Exploiting Symmetries When Proving Equivalence Properties for Security Protocols

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Vincent Cheval, Steve Kremer, Itsaka Rakotonirina

Journal title: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security

Journal publisher: ACM

Published year: 2019

Published pages: 905-922

DOI identifier: 10.1145/3319535.3354260

ISBN: 9781-450367479