Discovering attacks on security protocols by refuting incorrect inductive conjectures
Cryptographic security protocols are used to allow agents to communicate securely over an insecure network. Although security protocols are usually quite short, they often have subtle flaws in them which allow the protocol to be 'attacked' and security breached. Interactive inductive theor...
Main Author: | |
---|---|
Published: |
University of Edinburgh
2004
|
Subjects: | |
Online Access: | http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.662389 |