Proving security protocols with model checkers by data independence techniques
- 27 November 2002
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
No abstract availableKeywords
This publication has 9 references indexed in Scilit:
- Some new attacks upon security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Intensional specifications of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Casper: a compiler for the analysis of security protocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Modelling and verifying key-exchange protocols using CSP and FDRPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Using CSP to detect errors in the TMN protocolIEEE Transactions on Software Engineering, 1997
- Symmetry and model checkingFormal Methods in System Design, 1996
- Better verification through symmetryFormal Methods in System Design, 1996
- Theorems for free!Published by Association for Computing Machinery (ACM) ,1989
- Expressing interesting properties of programs in propositional temporal logicPublished by Association for Computing Machinery (ACM) ,1986