ISBN-13: 9783642087820 / Angielski / Miękka / 2010 / 274 str.
ISBN-13: 9783642087820 / Angielski / Miękka / 2010 / 274 str.
The author investigates proofs of correctness of realistic security protocols in a formal, intuitive setting. The protocols examined include Kerberos versions, smartcard protocols, non-repudiation protocols, and certified email protocols. The method of analysis turns out to be both powerful and flexible. This research advances significant extensions to the method of analysis, while the findings on the protocols analysed are novel and illuminating.