Automated reasoning and the verification of security protocols

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.

You may have access to this PDF.

Abstract

The formal verification of security protocols is one of the successful applications of automated reasoning1. Techniques based on belief logics, model checking, and theorem proving have been successful in determining strengths and weaknesses of many protocols, some of which have been even fielded before being discovered badly wrong. This tutorial presents the problems to the "security illiterate", explaining aims, objectives and tools of this application of automated reasoning.

Cite

CITATION STYLE

APA

Massacci, F. (1999). Automated reasoning and the verification of security protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1617, pp. 32–34). Springer Verlag. https://doi.org/10.1007/3-540-48754-9_6

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free