Process calculi and the verification of security protocols
DOI:
https://doi.org/10.26636/jtit.2002.4.147Keywords:
cryptographic protocols, Dolev-Yao model, observational equivalence, process calculi, spi calculusAbstract
Recently there has been much interest towards using formal methods in the analysis of security protocols. Some recent approaches take advantage of concepts and techniques from the field of process calculi. Process calculi can be given a formal yet simple semantics, which permits rigorous definitions of such concepts as ``attacker``, ``secrecy`` and ``authentication``. This feature has led to the development of solid reasoning methods and verification techniques, a few of which we outline in this paper.
Downloads
Downloads
Published
Issue
Section
License
Copyright (c) 2002 Journal of Telecommunications and Information Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.