An intruder model for verifying termination in security protocols

Share/Save/Bookmark

Cederquist, Jan and Dashti, M.T. (2005) An intruder model for verifying termination in security protocols. [Report]

[img]
Preview
PDF
175Kb
Abstract:We formally describe an intruder that is suitable for checking fairness properties of security protocols. The intruder is proved to be equivalent to the Dolev-Yao intruder that respects the resilient communication channels assumption, in the sense that, if a fairness property holds in one of these models, it also holds in the other.
Item Type:Report
Copyright:© 2005 CTIT
Faculty:
Electrical Engineering, Mathematics and Computer Science (EEMCS)
Research Group:
Link to this item:http://purl.utwente.nl/publications/54532
Export this item as:BibTeX
EndNote
HTML Citation
Reference Manager

 

Repository Staff Only: item control page

Metis ID: 228788