Introduction Symbolic Model Computational Model Implementations Conclusion
Security Protocol Verification: Symbolic and Computational Models
Bruno Blanchet
INRIA, ´ Ecole Normale Sup´ erieure, CNRS Bruno.Blanchet@ens.fr
March 2012
Bruno Blanchet (INRIA, ENS, CNRS) ETAPS March 2012 1 / 48