Auth--The Inductive Approach to Verifying Security Protocols

Cryptographic protocols are of major importance, especially with the growing use of the Internet. This directory demonstrates the ``inductive method'' of protocol verification, which is described in various papers. The operational semantics of protocol participants is defined inductively.

This directory contains proofs concerning

Frederic Blanqui has contributed a theory of guardedness, which is demonstrated by proofs of some roving agent protocols.


Last modified $Date$

Larry Paulson, lcp@cl.cam.ac.uk