Using a PVS embedding of CSP to verify authentication protocols
- 1 January 1997
- book chapter
- Published by Springer Nature
- p. 121-136
- https://doi.org/10.1007/bfb0028390
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Security properties and CSPPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1996
- Breaking and fixing the Needham-Schroeder Public-Key Protocol using FDRPublished by Springer Nature ,1996
- Deciding cryptographic protocol adequacy with HOL: The implementationPublished by Springer Nature ,1996
- Three systems for cryptographic protocol analysisJournal of Cryptology, 1994
- Towards a duration calculus proof assistant in PVSPublished by Springer Nature ,1994
- On Unifying Some Cryptographic Protocol LogicsPublished by Defense Technical Information Center (DTIC) ,1994
- Mechanizing CSP trace theory in higher order logicIEEE Transactions on Software Engineering, 1990
- A logic of authenticationPublished by Association for Computing Machinery (ACM) ,1989
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978