Skip to main content
Article thumbnail
Location of Repository

An improved constraint-based system for the verification of security protocols

By Ricardo Corin and Ro Etalle

Abstract

Abstract. We propose a constraint-based system for the verification of security protocols that improves upon the one developed by Millen and Shmatikov [30]. Our system features (1) a significantly more efficient implementation, (2) a monotonic behavior, which also allows to detect flaws associated to partial runs and (3) a more expressive syntax, in which a principal may also perform explicit checks. In this paper we also show why these improvements yield a more effective and practical system.

Publisher: Springer-Verlag
Year: 2002
OAI identifier: oai:CiteSeerX.psu:10.1.1.133.9850
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://wwwhome.cs.utwente.nl/~... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.