Oh!... is it really you? : using rank functions to verify authentication protocols

A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each...

Full description

Bibliographic Details
Main Author: Heather, James
Published: Royal Holloway, University of London 2000
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363