Selected publications at LSV: 2008

In this paper, mostly consisting of definitions, we revisit the models of security protocols: we show that the symbolic and the computational models (as well as others) are instances of a same generic model. Our definitions are also parametrized by the security primitives, the notion of attacker and, to some extent, the process calculus.

   address = {Bangalore, India},
   author = {Comon{-}Lundh, Hubert},
   booktitle = {{P}roceedings of the 28th {C}onference on {F}oundations of {S}oftware {T}echnology and {T}heoretical {C}omputer {S}cience ({FSTTCS}'08)},
   editor = {Hariharan, Ramesh and Mukund, Madhavan and Vinay, V.},
   month = dec,
   publisher = {Leibniz-Zentrum f{\"u}r Informatik},
   series = {Leibniz International Proceedings in Informatics},
   title = {About models of security protocols},
   url = {},
   volume = {2},
   year = {2008},

About LSV