Model Checking in Security Protocol Analysis
暂无分享,去创建一个
Theorem proving and model checking are two main approaches used for the formal analysis of security protocols. As described in Chapter 1, theorem proving focused on the verification of authentication protocols and cryptography protocols. Although Heintze [68] firstly used model checking to analyse electronic transaction protocols, the efforts used for model checking of electronic transaction protocols are underdeveloped due to increasing complexity and varied types of application of the protocols.