
In print
Ebook
Audiobook
Library
We may earn a commission. Learn more.
Formal Correctness of Security Protocols
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
No reviews yet.
Be the first to write one.
No highlights yet.
Be the first to share one.