Inductive study of confidentiality: for everyone

@article{Bella2012InductiveSO,
  title={Inductive study of confidentiality: for everyone},
  author={Giampaolo Bella},
  journal={Formal Aspects of Computing},
  year={2012},
  volume={26},
  pages={3-36}
}
The Inductive Method is among the most established tools to analyse security protocols formally. It has successfully coped with large, deployed protocols, and its findings are widely published. However, perhaps due to its embedding in a theorem prover or to the lack of tutorial publications, it is at times criticised to require super-specialised skills and… CONTINUE READING