Model Checking in Security Protocol Analysis

Theorem proving and model checking are two main approaches used for the formal analysis of security protocols. As described in Chapter 1, theorem proving focused on the verification of authentication protocols and cryptography protocols. Although Heintze [68] firstly used model checking to analyse electronic transaction protocols, the efforts used for model checking of electronic transaction protocols are underdeveloped due to increasing complexity and varied types of application of the protocols.