Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol
暂无分享,去创建一个
This paper presents a general approach for analysis and veri cation of authentication properties in CSP It is illustrated by an examination of the Needham Schroeder Public Key protocol The paper aims to develop a speci c theory appropriate to the analysis of authentication protocols built on top of the general CSP semantic framework This approach aims to combine the ability to express such protocols in a natural and precise way with the ability to reason formally about the properties they exhibit
[1] C. A. R. Hoare,et al. Communicating sequential processes , 1978, CACM.