@COMMENT This file was generated by bib2html.pl <https://sourceforge.net/projects/bib2html/> version 0.94
@COMMENT written by Patrick Riley <http://sourceforge.net/users/patstg/>
@inproceedings{esop03,
  address =       {Warsaw, Poland},
  author =        {Comon{-}Lundh, Hubert and Cortier, V{\'e}ronique},
  booktitle =     {{P}roceedings of the 12th {E}uropean {S}ymposium on
                   {P}rogramming ({ESOP}'03)},
  editor =        {Degano, Pierpaolo},
  month =         apr,
  pages =         {99-113},
  publisher =     {Springer},
  series =        {Lecture Notes in Computer Science},
  title =         {Security properties: two agents are sufficient},
  volume =        {2618},
  year =          {2003},
  abstract = {We consider arbitrary cryptographic protocols and security properties. We show that it is always sufficient to consider a bounded number of agents b (actually b = 2 in most of the cases): if there is an attack involving n agents, then there is an attack involving at most b agents.},
}
