The Modelling and Analysis of Security Protocols

The Modelling and Analysis of Security Protocols The CSP Approach

An introduction to CSP - Modelling security protocols in CSP - Expressing protocol goals - Overview of FDR - Casper - Encoding protocols and intruders for FDR - Theorem proving - Simplifying transformations - Other approaches - Prospects and wider issues.
Sign up to use