Detail publikace

On Inductive Approach in Security Protocol Verification

Originální název

On Inductive Approach in Security Protocol Verification

Anglický název

On Inductive Approach in Security Protocol Verification

Jazyk

en

Originální abstrakt

This paper outlines some inductive methods that are used in verification of security protocols. The basic idea of inductive proof is outlined, followed by the description of the popular theorem prover Isabelle. The second part covers the description of spi-calculus which can be used
to analyze security protocols as concurrent processes over communication channels.

Anglický abstrakt

This paper outlines some inductive methods that are used in verification of security protocols. The basic idea of inductive proof is outlined, followed by the description of the popular theorem prover Isabelle. The second part covers the description of spi-calculus which can be used
to analyze security protocols as concurrent processes over communication channels.

BibTex


@inproceedings{BUT16916,
  author="Pavel {Očenášek}",
  title="On Inductive Approach in Security Protocol Verification",
  annote="This paper outlines some inductive methods that are used in verification of security protocols. The basic idea of inductive proof is outlined, followed by the description of the popular theorem prover Isabelle. The second part covers the description of spi-calculus which can be used
to analyze security protocols as concurrent processes over communication channels.", address="Faculty of Electrical Engineering and Communication BUT", booktitle="Proceedings of the 10th Conference and Competition STUDENT EEICT 2004", chapter="16916", institution="Faculty of Electrical Engineering and Communication BUT", year="2004", month="april", pages="272--276", publisher="Faculty of Electrical Engineering and Communication BUT", type="conference paper" }