Related Books
Language: en
Pages: 134
Pages: 134
Type: BOOK - Published: 2014-11-13 - Publisher:
Provides the reader with a tutorial on some modern techniques to model and automatically analyze security protocols. The tutorial can be used as a basis for a m
Language: en
Pages: 239
Pages: 239
Type: BOOK - Published: 2008-07-20 - Publisher: Springer
The application of formal methods to security protocol analysis has attracted increasing attention in the past two decades, and recently has been sh- ing signs
Language: en
Pages: 239
Pages: 239
Type: BOOK - Published: 2019-05-17 - Publisher: Springer
This Festschrift volume is published in honor of Catherine A. Meadows and contains essays presented at the Catherine Meadows Festschrift Symposium held in Frede
Language: en
Pages: 314
Pages: 314
Type: BOOK - Published: 2001 - Publisher: Addison-Wesley Professional
An introduction to CSP - Modelling security protocols in CSP - Expressing protocol goals - Overview of FDR - Casper - Encoding protocols and intruders for FDR -
Language: en
Pages: 281
Pages: 281
Type: BOOK - Published: 2007-05-27 - Publisher: Springer Science & Business Media
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions,