Discovering attacks on security protocols by refuting incorrect inductive conjectures

Cryptographic security protocols are used to allow agents to communicate securely over an insecure network. Although security protocols are usually quite short, they often have subtle flaws in them which allow the protocol to be 'attacked' and security breached. Interactive inductive theor...

Full description

Bibliographic Details
Main Author: Steel, Graham J.
Published: University of Edinburgh 2004
Subjects:
Online Access:http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.662389