Skip to main content
Article thumbnail
Location of Repository

Acknowledgments

By Ariel Cohen

Abstract

I would like to express my deep appreciation to my thesis advisors Professor Amir Pnueli and Professor Lenore Zuck for suggesting the subject of this thesis and for their guidance and encouragement in performing it. II Several security protocol verifiers were created in order to verify the secrecy and authenticity of security protocols. A recent one created by Bruno Blanchet- “Cryptographic Protocol Verifier” (CPV), uses Horn clauses. CPV has some important advantages such as being able to determine that a protocol is secure, the ability to handle an unbounded number of sessions of the protocol, and it being reasonably fast. Some of its weaker points are that in some cases a false attack could be identified as truly existing, and that the description of a detected attack is provided as a proof consisting of combinations of Horn clauses and rules which are quite cumbersome. “Temporal Logic Verifier ” (TLV), which provides a flexible environment for th

Year: 2004
OAI identifier: oai:CiteSeerX.psu:10.1.1.134.6644
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://eeyore.cs.nyu.edu/~arie... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.