Publication year: 2007
ISBN: 978-3-540-68136-6
Internet Resource: Please Login to download book
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.
Subject: Computer Science, Formal methods, Inductive techniques, Information, Isabelle, Kerberos, Protocol engineering, Security protocols, Theorem proving, data security, formal method, network security, security