In this paper we contrast the use of the NRL Protocol Analyzer and Gavin Lowe’s use of the model checker FDR [8] to analyze the Needham-Schroeder public key protocol. This is used as a basis for comparing and contrasting the two systems and to point out possible future directions for research.
CITATION STYLE
Meadows, C. A. (1996). Analyzing the Needham-Schroeder public key protocol: A comparison of two approaches. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1146, pp. 351–364). Springer Verlag. https://doi.org/10.1007/3-540-61770-1_46
Mendeley helps you to discover research relevant for your work.