The formal verification of security protocols is one of the successful applications of automated reasoning1. Techniques based on belief logics, model checking, and theorem proving have been successful in determining strengths and weaknesses of many protocols, some of which have been even fielded before being discovered badly wrong. This tutorial presents the problems to the "security illiterate", explaining aims, objectives and tools of this application of automated reasoning.
CITATION STYLE
Massacci, F. (1999). Automated reasoning and the verification of security protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1617, pp. 32–34). Springer Verlag. https://doi.org/10.1007/3-540-48754-9_6
Mendeley helps you to discover research relevant for your work.