Soft Constraint Programming for Analyzing Security Protocols: Revision history

Jump to navigation Jump to search

Diff selection: Mark the radio buttons of the revisions to compare and hit enter or the button at the bottom.
Legend: (cur) = difference with latest revision, (prev) = difference with preceding revision, m = minor edit.

24 December 2023

  • curprev 15:0315:03, 24 December 2023SatoshiNakamoto talk contribs 1,475 bytes +1,475 Created page with "Title: Soft Constraint Programming for Analyzing Security Protocols Abstract: This research proposes a uniform formalism for security protocols' two crucial goals: confidentiality and authentication. Unlike previous work, these goals are no longer viewed as yes/no properties but are given an extra parameter, the security level. This approach allows for different levels of confidentiality and authentication for different messages or principals. The research framework..."