Auth--The Inductive Approach to Verifying Security Protocols

Cryptographic protocols are of major importance, especially with the growing use of the Internet. This directory demonstrates a new proof method. The operational semantics of protocol participants is defined inductively. The directory contains proofs concerning


Last modified 7 May 1997

lcp@cl.cam.ac.uk