University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Verifying authentication protocols with CSP.

Schneider, S (1997) Verifying authentication protocols with CSP. In: IEEE Computer Security Foundations Workshop, 1997-06-10 - 1997-06-12, Rockport, MA , USA.

Available under License : See the attached licence file.

Download (247kB)
[img] Text (licence)

Download (1kB)


This paper presents a general approach for analysis and veri cation of authentication properties in the language of Communicating Sequential Processes CSP It is il lustrated by an examination of the Needham Schroeder public key protocol The contribution of this paper is to develop a speci c theory appropriate to the analy sis of authentication protocols built on top of the gen eral CSP semantic framework This approach aims to combine the ability to express such protocols in a natu ral and precise way with the facility to reason formally about the properties they exhibit

Item Type: Conference or Workshop Item (Conference Paper)
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Schneider, S
Date : 1997
DOI : 10.1109/CSFW.1997.596775
Contributors :
ContributionNameEmailORCID Computer Society,
Related URLs :
Additional Information :

Copyright 2008 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

Depositing User : Symplectic Elements
Date Deposited : 03 Feb 2012 14:45
Last Modified : 31 Oct 2017 14:09

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800