Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches. © 2012 Springer-Verlag.
CITATION STYLE
Blanchet, B. (2012). Security protocol verification: Symbolic and computational models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 7215 LNCS, pp. 3–29). https://doi.org/10.1007/978-3-642-28641-4_2
Mendeley helps you to discover research relevant for your work.