The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
<p>With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely diffocult for humans, as witnessed by the fact that m...
Main Author: | Cremers, C |
---|---|
Format: | Book section |
Published: |
Springer
2008
|
Similar Items
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
by: Cremers, C
Published: (2008) -
Verification, falsification and cancellation in KT
by: Williamson, T
Published: (1990) -
Verification and Falsification of Programs with Loops Using Predicate Abstraction
by: Kroening, D, et al.
Published: (2009) -
Verification and falsification of programs with loops using predicate abstraction.
by: Kroening, D, et al.
Published: (2010) -
A framework for compositional verification of security protocols
by: Andova, S, et al.
Published: (2006)