Sciweavers

TPHOL
2003
IEEE

Verifying Second-Level Security Protocols

13 years 9 months ago
Verifying Second-Level Security Protocols
Abstract. A second-level security protocol is defined as a security protocol that relies on an underlying security protocol in order to achieve its goals. The verification of classical authentication protocols has become routine, but second-level protocols raise new challenges. These include the formalisation of appeals to the underlying protocols, the modification of the threat model, and the formalisation of the novel goals. These challenges have been met using Isabelle and the Inductive Approach [14]. The outcomes are demonstrated on a recent protocol for certified e-mail delivery by Abadi et al. [2].
Giampaolo Bella, Cristiano Longo, Lawrence C. Paul
Added 05 Jul 2010
Updated 05 Jul 2010
Type Conference
Year 2003
Where TPHOL
Authors Giampaolo Bella, Cristiano Longo, Lawrence C. Paulson
Comments (0)