@InProceedings{bana_et_al:LIPIcs.FSTTCS.2012.546,
author = {Bana, Gergei and Adao, Pedro and Sakurada, Hideki},
title = {{Computationally Complete Symbolic Attacker in Action}},
booktitle = {IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2012)},
pages = {546--560},
series = {Leibniz International Proceedings in Informatics (LIPIcs)},
ISBN = {978-3-939897-47-7},
ISSN = {1868-8969},
year = {2012},
volume = {18},
editor = {D'Souza, Deepak and Radhakrishnan, Jaikumar and Telikepalli, Kavitha},
publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},
address = {Dagstuhl, Germany},
URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.FSTTCS.2012.546},
URN = {urn:nbn:de:0030-drops-38888},
doi = {10.4230/LIPIcs.FSTTCS.2012.546},
annote = {Keywords: Security Protocols, Symbolic Adversary, Computational Soundness}
}