CSP PVS and a Recursive Authentication Protocol
نویسندگان
چکیده
منابع مشابه
Using a PVS Embedding of CSP to Verify Authentication Protocols
This paper presents an application of PVS to the veri cation of security protocols. The objective is to provide mechanical support for a veri cation method described in [14]. The PVS formalization consists of a semantic embedding of CSP and of a collection of theorems and proof rules for reasoning about authentication properties. We present an application to the Needham-Schroeder public key pro...
متن کاملUsing a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs Bell Labs Murray Hill New Jersey USA
This paper presents an application of PVS to the veri cation of security protocols The objective is to provide mechanical support for a veri cation method described in The PVS formalization consists of a semantic embedding of CSP and of a collection of theorems and proof rules for reasoning about authentication properties We present an application to the Needham Schroeder public key protocol
متن کاملEmbedding CSP in PVS. An Application to Authentication Protocols
In [28], Schneider applies CSP to the modelling and analysis of authentication protocols and develops a general proof strategy for verifying authentication properties. This paper shows how the PVS theorem prover can provide e ective mechanical support to the approach.
متن کاملUsing a PVS Embedding of CSP to
This paper presents an application of PVS to the veriication of security protocols. The objective is to provide mechanical support for a veriication method described in 14]. The PVS formalization consists of a semantic embedding of CSP and of a collection of theorems and proof rules for reasoning about authentication properties. We present an application to the Needham-Schroeder public key prot...
متن کامل