A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Role based specification and security analysis of cryptographic protocols using asynchronous product automata
Proceedings. 13th International Workshop on Database and Expert Systems Applications
Cryptographic protocols are formally specified as a system of protocol agents using asynchronous product automata (APA). APA are a universal and very flexible operational description concept for communicating automata. Their specification, analysis and verification is supported by the SH-verification tool (SHVT). The local state of each agent is structured in several components describing its knowledge of keys, its "view" of the protocol and the goals to be reached within the protocol.
doi:10.1109/dexa.2002.1045943
dblp:conf/dexaw/GurgensOR02
fatcat:avfdwm3awbg5dht7q6rumdia4a