Analysing Time Dependent Security Properties in CSP Using PVS
- 1 January 2000
- book chapter
- Published by Springer Nature
- p. 222-237
- https://doi.org/10.1007/10722599_14
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Verifying authentication protocols in CSPIEEE Transactions on Software Engineering, 1998
- Timewise refinement for communicating processesScience of Computer Programming, 1997
- Using a PVS embedding of CSP to verify authentication protocolsPublished by Springer Nature ,1997
- Language Generation and Verification in the NRL Protocol AnalyzerPublished by Defense Technical Information Center (DTIC) ,1996
- On the security of recent protocolsInformation Processing Letters, 1995
- IsabellePublished by Springer Nature ,1994
- PVS: A prototype verification systemLecture Notes in Computer Science, 1992
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- On the security of public key protocolsIEEE Transactions on Information Theory, 1983