Sciweavers

CAV
1998
Springer

Mechanising BAN Kerberos by the Inductive Method

13 years 8 months ago
Mechanising BAN Kerberos by the Inductive Method
The version of Kerberos presented by Burrows et al. [5] is fully mechanised using the Inductive Method. Two models are presented, allowing respectively the leak of any session keys, and of expired session keys. Thanks to timestamping, the protocol provides the involved parties with strong guarantees in a realistically hostile environment. These guarantees are supported by the generic theorem prover Isabelle.
Giampaolo Bella, Lawrence C. Paulson
Added 05 Aug 2010
Updated 05 Aug 2010
Type Conference
Year 1998
Where CAV
Authors Giampaolo Bella, Lawrence C. Paulson
Comments (0)