A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is
The verification of security protocols has attracted a lot of interest in the formal methods community, yielding two main verification approaches: i) state exploration, e.g. FDR  and OFMC ; and ii) theorem proving, e.g. the Isabelle inductive method  and Coral  . Complementing formal methods, Abadi and Needham's principles aim to guide the design of security protocols in order to make them simple and, hopefully, correct . We are interested in a problem related to verificationdoi:10.1016/j.entcs.2006.12.034 fatcat:p4oslnczmrcafoippaufapz4wu