E-Books durchsuchen

Formal Correctness of Security Protocols [2007]

1
Introduction
17
The Analysis of Security Protocols
31
The Inductive Method
49
Verifying the Protocol Goals
63
The Principle of Goal Availability
73
Modelling Timestamping and Verifying a Classical Protocol
87
Verifying a Deployed Protocol
111
Modelling Agents’ Knowledge of Messages
139
Verifying Another Deployed Protocol
153
Modelling Smartcards
165
Verifying a Smartcard Protocol
195
Modelling Accountability
207
Verifying Two Accountability Protocols
225
Conclusions
Feedback