Oh!... is it really you? : using rank functions to verify authentication protocols
A security protocol is a mechanism designed to allow secure communications through an insecure medium, even when that medium is controlled by a hostile attacker. Historically, approaches to analysis of security protocols have fallen into two broad categories: model checking and theorem proving. Each...
Main Author: | Heather, James |
---|---|
Published: |
Royal Holloway, University of London
2000
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.394363 |
Similar Items
Similar Items
-
Annotated transition systems for verifying concurrent programs
by: Paczkowski, Pawel
Published: (1990) -
Modelling, analysing and model checking commit protocols
by: Kempster, Tim
Published: (2000) -
Data independence in the model checking of security protocols
by: Broadfoot, Philippa J.
Published: (2001) -
Functional metaprogramming
by: Powell, Gareth Moffat
Published: (1993) -
Dependently typed functional programs and their proofs
by: McBride, Conor
Published: (2000)