Analysing Applications Layered on Unilaterally Authenticating Protocols.
There are many approaches to proving the correctness of application-layer protocols that are layered on secure transport protocols, such as TLS. One popular approach is verification by abstraction, in which the correctness of the application-layer protocol is proven under the assumption that the tra...
Main Authors: | Gibson-Robinson, T, Lowe, G |
---|---|
Other Authors: | Barthe, G |
Format: | Journal article |
Language: | English |
Published: |
Springer
2011
|
Similar Items
-
Analysing Applications Layered on Unilaterally Authenticating Protocols
by: Gibson−Robinson, T, et al.
Published: (2011) -
Analysing Applications Layered on Unilaterally Authenticating Protocols
by: Gibson−Robinson, T, et al.
Published: (2011) -
Analysing layered security protocols
by: Gibson-Robinson, T
Published: (2013) -
Analysing Layered Security Protocols
by: Gibson−Robinson, T
Published: (2013) -
Analysing a Stream Authentication Protocol Using Model Checking
by: Broadfoot, P, et al.
Published: (2002)