A Computational Logic-based approach to security protocols verification , and its application to the Needham-Schroeder Public Key authentication protocol

@inproceedings{Alberti2004ACL,
  title={A Computational Logic-based approach to security protocols verification , and its application to the Needham-Schroeder Public Key authentication protocol},
  author={Marco Alberti},
  year={2004}
}
In this work we present a proof-theoretic approach to the verification of security protocols. Starting from the perspective of open multi-agent systems, where the internal architecture of the individual system’s components may not be completely specified but it is important to infer and prove properties about the overall system behaviour, we propose a general framework where several kinds of verification can be applied. We take a formal approach based on Computational Logic, to tackle… CONTINUE READING