Analysing layered security protocols

<p>Many security protocols are built as the composition of an application-layer protocol and a secure transport protocol, such as TLS. There are many approaches to proving the correctness of such protocols. One popular approach is verification by abstraction, in which the correctness of the ap...

وصف كامل

التفاصيل البيبلوغرافية
المؤلف الرئيسي: Gibson-Robinson, T
مؤلفون آخرون: Lowe, G
التنسيق: أطروحة
اللغة:English
منشور في: 2013
الموضوعات: