Oh!... is it really you? : using rank functions to verify authentication protocols
A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each...
Main Author: | |
---|---|
Published: |
Royal Holloway, University of London
2000
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363 |