E-Books durchsuchen
Formal Correctness of Security Protocols [2007]
- 1
-
Introduction
- 17
-
The Analysis of Security Protocols
- 31
-
The Inductive Method
- 49
-
Verifying the Protocol Goals
- 63
-
The Principle of Goal Availability
- 73
-
Modelling Timestamping and Verifying a Classical Protocol
- 87
-
Verifying a Deployed Protocol
- 111
-
Modelling Agents’ Knowledge of Messages
- 139
-
Verifying Another Deployed Protocol
- 153
-
Modelling Smartcards
- 165
-
Verifying a Smartcard Protocol
- 195
-
Modelling Accountability
- 207
-
Verifying Two Accountability Protocols
- 225
-
Conclusions