Thesis icon

Thesis

Analysing layered security protocols

Abstract:

Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the transport layer satisfies certain properties, such as confidentiality. Following this approach, we adapt the strand spaces model in order ...

Expand abstract

Actions


Access Document


Files:

Authors


More by this author
Institution:
University of Oxford
Oxford college:
St Catherine's College
Department:
Mathematical,Physical & Life Sciences Division - Computer Science,Department of

Contributors

Role:
Supervisor
Publication date:
2013
Type of award:
DPhil
Level of award:
Doctoral
Awarding institution:
Oxford University, UK
URN:
uuid:35c9e4e5-6540-4e1d-9fcc-a98f8f60c20a
Local pid:
ora:8134

Terms of use


Metrics



If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP