">

Cryptographic Protocol Analysis


Citation: Giampaolo Bella and Elvinia Riccobene, "A Realistic Environment for Crypto-Protocol Analyses by ASMs." In Proceedings of the 28th Annual Conference of the German Society of Computer Science, Technical Report, Magdeburg University, 1998.
Summary: ASMs are used to give a model of a general, realistic environment in which cryptographic protocols can be faithfully analyzed. The Needham-Schroeder protocol is analyzed as an example.
Subjects: Protocols, Security, Verification
Download: PostScript, PDF, Compressed PostScript.
Notes: