Result Details

On Inductive Approach in Security Protocol Verification

OČENÁŠEK, P. On Inductive Approach in Security Protocol Verification. Proceedings of the 10th Conference and Competition STUDENT EEICT 2004. Brno: Faculty of Electrical Engineering and Communication BUT, 2004. p. 272-276. ISBN: 80-214-2635-7.
Type
conference paper
Language
English
Authors
Abstract

This paper outlines some inductive methods that are used in verification of security protocols. The basic idea of inductive proof is outlined, followed by the description of the popular theorem prover Isabelle. The second part covers the description of spi-calculus which can be used
to analyze security protocols as concurrent processes over communication channels.

Keywords

inductive approach, communication protocols, security, formal verification

Published
2004
Pages
272–276
Proceedings
Proceedings of the 10th Conference and Competition STUDENT EEICT 2004
Conference
Student EEICT 2004
ISBN
80-214-2635-7
Publisher
Faculty of Electrical Engineering and Communication BUT
Place
Brno
BibTeX
@inproceedings{BUT16916,
  author="Pavel {Očenášek}",
  title="On Inductive Approach in Security Protocol Verification",
  booktitle="Proceedings of the 10th Conference and Competition STUDENT EEICT 2004",
  year="2004",
  pages="272--276",
  publisher="Faculty of Electrical Engineering and Communication BUT",
  address="Brno",
  isbn="80-214-2635-7"
}
Research groups
Departments
Back to top