From 3e085d34172f520a13d96cfdc20c7e8f55dbdb9b Mon Sep 17 00:00:00 2001
From: Teresa Carbajo-Garcia <t.carbajo-garcia@imperial.ac.uk>
Date: Tue, 13 Jun 2017 15:17:37 +0100
Subject: [PATCH] Update 2017-06-13-cade.md

---
 _posts/{2017-06-13-cade.md => 2017-06-13-csf.md} | 4 ++--
 1 file changed, 2 insertions(+), 2 deletions(-)
 rename _posts/{2017-06-13-cade.md => 2017-06-13-csf.md} (89%)

diff --git a/_posts/2017-06-13-cade.md b/_posts/2017-06-13-csf.md
similarity index 89%
rename from _posts/2017-06-13-cade.md
rename to _posts/2017-06-13-csf.md
index 6345cba..6f89b2a 100644
--- a/_posts/2017-06-13-cade.md
+++ b/_posts/2017-06-13-csf.md
@@ -7,8 +7,8 @@ Emanuele's paper, in collaboration with [Luke Ong](http://www.cs.ox.ac.uk/luke.o
 Nanyang Technological University, Singapore, is entitled ['Deciding Secrecy of Security Protocols for an Unbounded Number of Sessions: The Case of Depth-bounded Processes'](http://www.emanueledosualdo.com/research/papers/2017/csf-decidable-secrecy.html)
 
 In the paper, the authors introduce a new class of security protocols with an unbounded number of sessions and unlimited fresh data 
-for which the problem of secrecy is decidable. The only constraint we place on the class is a notion of depth-boundedness. 
-Precisely we prove that, restricted to messages of up to a given size, secrecy is decidable for all depth-bounded processes. 
+for which the problem of secrecy is decidable. The only constraint placed on the class is a notion of depth-boundedness. 
+They prove that, restricted to messages of up to a given size, secrecy is decidable for all depth-bounded processes. 
 This decidable fragment of security protocols captures many real-world symmetric key protocols, including Needham-Schroeder Symmetric Key, 
 Otway-Rees, and Yahalom.
 
-- 
GitLab