Skip to main content

Automated reasoning and the verification of security protocols

Citations of this article
Mendeley users who have this article in their library.
Get full text


The formal verification of security protocols is one of the successful applications of automated reasoning1. Techniques based on belief logics, model checking, and theorem proving have been successful in determining strengths and weaknesses of many protocols, some of which have been even fielded before being discovered badly wrong. This tutorial presents the problems to the "security illiterate", explaining aims, objectives and tools of this application of automated reasoning.




Massacci, F. (1999). Automated reasoning and the verification of security protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1617, pp. 32–34). Springer Verlag.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free