Model Checking for Security Protocols

  title={Model Checking for Security Protocols},
  author={Will Marrero and Edmund Clarke and Somesh Jha},
As more resources are added to computer networks, and as more vendors look to the World Wide Web as a viable marketplace, the importance of being able to restrict access and to insure some kind of acceptable behavior even in the presence of malicious intruders becomes paramount. People have looked to cryptography to help solve many of these problems. However, cryptography itself is only a tool. The security of a system depends not only on the cryptosystem being used, but also on how it is used… CONTINUE READING
Highly Cited
This paper has 124 citations. REVIEW CITATIONS
80 Citations
24 References
Similar Papers


Publications citing this paper.
Showing 1-10 of 80 extracted citations

125 Citations

Citations per Year
Semantic Scholar estimates that this publication has 125 citations based on the available data.

See our FAQ for additional information.


Publications referenced by this paper.
Showing 1-10 of 24 references

Breaking and xing the Needham-Schroeder public-key protocol using FDR

  • G. Lowe
  • Tools and Algorithms for the Construction and…
  • 1996
Highly Influential
8 Excerpts

Providing equitable conditional access by use of trusted third parties

  • S. Lacroix, J.-M. Boucqueau, J.-J. Quistater, B. Macq
  • European Conference on Multimedia Applications…
  • 1996
1 Excerpt

Similar Papers

Loading similar papers…