Bella, Giampaolo
Formal Correctness of Security Protocols
1. Introduction
Giampaolo Bella
2. The Analysis of Security Protocols
Giampaolo Bella
3. The Inductive Method
Giampaolo Bella
4. Verifying the Protocol Goals
Giampaolo Bella
5. The Principle of Goal Availability
Giampaolo Bella
6. Modelling Timestamping and Verifying a Classical Protocol
Giampaolo Bella
7. Verifying a Deployed Protocol
Giampaolo Bella
8. Modelling Agents’ Knowledge of Messages
Giampaolo Bella
9. Verifying Another Deployed Protocol
Giampaolo Bella
10. Modelling Smartcards
Giampaolo Bella
11. Verifying a Smartcard Protocol
Giampaolo Bella
12. Modelling Accountability
Giampaolo Bella
13. Verifying Two Accountability Protocols
Giampaolo Bella
14. Conclusions
Giampaolo Bella
DRM-restrictions
Printing: not available
Clipboard copying: not available
Keywords: COMPUTERS / Computer Science COM014000
- Author(s)
- Bella, Giampaolo
- Publisher
- Springer
- Publication year
- 2007
- Language
- en
- Edition
- 1
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783540681366