Book section icon

Book section

The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper

Abstract:

With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that many protocols were found to be awed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct ...

Expand abstract
Publication status:
Published
Peer review status:
Peer reviewed

Actions


Access Document


Authors


More by this author
Institution:
University of Oxford
Department:
Oxford, MPLS, Computer Science
Role:
Author
Publisher:
Springer Publisher's website
Volume:
5123 LNCS
Pages:
414-418
Host title:
Computer Aided Verification
Publication date:
2008-08-05
DOI:
EISSN:
1611-3349
ISSN:
0302-9743
URN:
uuid:6dcd4806-2d6e-4c06-82aa-83174cb9d2ba
Source identifiers:
427858
Local pid:
pubs:427858
ISBN-10:
3540705430
ISBN-13:
9783540705437

Terms of use


Metrics


Views and Downloads






If you are the owner of this record, you can report an update to it here: Report update to this record

TO TOP