The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols

@inproceedings{Cremers2008TheST,
  title={The Scyther Tool: Verification, Falsification, and Analysis of Security Protocols},
  author={Cas J. F. Cremers},
  booktitle={CAV},
  year={2008}
}
With the rise of the Internet and other open networks, a large number of security protocols have been developed and deployed in order to provide secure communication. The analysis of such security protocols has turned out to be extremely difficult for humans, as witnessed by the fact that many protocols were found to be flawed after deployment. This has driven the research in formal analysis of security protocols. Unfortunately, there are no effective approaches yet for constructing correct and… CONTINUE READING
Highly Influential
This paper has highly influenced 33 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 324 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 203 extracted citations

325 Citations

0204060'09'11'13'15'17
Citations per Year
Semantic Scholar estimates that this publication has 325 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 12 references

Scyther - Semantics and Verification of Security Protocols

  • C. Cremers
  • Ph.D. dissertation, Eindhoven University of…
  • 2006
1 Excerpt

An Automatic Approach for Building Secure Systems

  • D. Song
  • PhD thesis, UC Berkeley
  • 2003
2 Excerpts

Similar Papers

Loading similar papers…