Auth--The Inductive Approach to Verifying Security Protocols

Cryptographic protocols are of major importance, especially with the growing use of the Internet. This directory demonstrates a new proof method, which is described in various papers. The operational semantics of protocol participants is defined inductively.

This directory contains proofs concerning


Last modified 20 August 2002

Larry Paulson, lcp@cl.cam.ac.uk