Description of the Auth directory: security protocols proofs
authorpaulson
Wed, 07 May 1997 12:49:02 +0200
changeset 3119 bb2ee88aa43f
parent 3118 24dae6222579
child 3120 c58423c20740
Description of the Auth directory: security protocols proofs
src/HOL/Auth/README.html
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/src/HOL/Auth/README.html	Wed May 07 12:49:02 1997 +0200
@@ -0,0 +1,30 @@
+<!-- $Id$ -->
+<HTML><HEAD><TITLE>HOL/Auth/README</TITLE></HEAD><BODY>
+
+<H2>Auth--The Inductive Approach to Verifying Security Protocols</H2>
+
+<P>Cryptographic protocols are of major importance, especially with the
+growing use of the Internet.  This directory demonstrates a <A
+HREF="http://www.cl.cam.ac.uk/ftp/papers/reports/TR409-lcp-Proving-Properties-of-Security-Protocols-by-Induction.dvi.gz">new
+proof method</A>.  The operational semantics of protocol participants is
+defined inductively.  The directory contains proofs concerning
+
+<UL>
+<LI>three versions of the Otway-Rees protocol
+
+<LI>the Needham-Schroeder protocol (<A
+HREF="http://www.cl.cam.ac.uk/ftp/papers/reports/TR413-lcp-Mechanized-Proofs-of-Security-Protocols-Needham-Schroeder-with-Public-Keys.dvi.gz">public-key</A>
+and shared-key versions)
+
+<LI>two versions of the Yahalom protocol
+
+<LI>a novel <A HREF="http://www.cl.cam.ac.uk/ftp/papers/reports/TR418-lcp-recur.ps.gz">recursive</A> authentication protocol 
+</UL>
+
+<HR>
+<P>Last modified 7 May 1997
+
+<ADDRESS>
+<A NAME="lcp@cl.cam.ac.uk" HREF="mailto:lcp@cl.cam.ac.uk">lcp@cl.cam.ac.uk</A>
+</ADDRESS>
+</BODY></HTML>