The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper

<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that m...

Full description

Bibliographic Details
Main Author: Cremers, C
Format: Book section
Published: Springer 2008