author paulson
Mon, 02 Feb 1998 12:56:24 +0100
changeset 4594 f8d4387b40d9
parent 3119 bb2ee88aa43f
child 6400 1f495d4d922b
permissions -rw-r--r--
fixed WWW links

<!-- $Id$ -->

<H2>Auth--The Inductive Approach to Verifying Security Protocols</H2>

<P>Cryptographic protocols are of major importance, especially with the
growing use of the Internet.  This directory demonstrates a <A
proof method</A>.  The operational semantics of protocol participants is
defined inductively.  The directory contains proofs concerning

<LI>three versions of the Otway-Rees protocol

<LI>the Needham-Schroeder protocol (public-key and shared-key versions)

<LI>two versions of the Yahalom protocol

<LI>a novel recursive authentication protocol 

<LI>the Internet protocol TLS

<P>Last modified 30 Jan 1998

<A NAME="" HREF=""></A>