A framework for compositional verification of security protocols
Automatic security protocol analysis is currently feasible only for small protocols. Since larger protocols quite often are composed of many small protocols, compositional analysis is an attractive, but non-trivial approach. We have developed a framework for compositional analysis of a large class...
Main Authors: | Andova, S, Cremers, C, Gjosteen, K, Mauw, S, Mjolsnes, S, Radomirovic, S |
---|---|
Format: | Journal article |
Language: | English |
Published: |
2006
|
Similar Items
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
by: Cremers, C
Published: (2008) -
The scyther tool: Verification, falsification, and analysis of security protocols - Tool paper
by: Cremers, C
Published: (2008) -
A multidisciplinary introduction to information security /
by: 566294 Mjolsnes, Stig F.
Published: (2012) -
A formal specification and verification framework for timed security protocols
by: Li, Li, et al.
Published: (2020) -
Automated verification of group key agreement protocols
by: Schmidt, B, et al.
Published: (2014)