Up: CSP, PVS and a
Previous: Dealing with failed proofs
- BO97
-
J. Bull and D. J. Otway.
The Authentication Protocol.
Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, DRA, Feb
1997.
- BS97
-
J. W. Bryans and S. A. Schneider.
Mechanical Verification of the full Needham-Schroeder Public-Key
Protocol.
Technical Report CSD-TR-97-11, Royal Holloway, University of London,
April 1997.
- DS97a
-
B. Dutertre and S. A. Schneider.
Embedding CSP in PVS. An application to Authentication Protocols.
Technical Report CSD-TR-97-12, Royal Holloway, University of London,
April 1997.
- DS97b
-
B. Dutertre and S. A. Schneider.
Using a PVS Embedding of CSP to verify Authentication Protocols.
In Proceedings of TPHOLS, 1997.
To appear.
- DY83
-
D. Dolev and A. C. Yao.
On the Security of Public Key Protocols.
IEEE Transactions on Information Theory, 29(2), 1983.
- Hoa85
-
C. A. R. Hoare.
Communicating Sequential Processes.
Prentice-Hall, 1985.
- Pau97
-
L. Paulson.
Mechanized proofs for a recursive authentication protocol.
unpublished, 1997.
- RS97
-
P. Y. A. Ryan and S. A. Schneider.
An Attack on a Recursive Authentication Protocol: A cautionary
tale.
DRA report, May 1997.
- Sch96
-
S. A. Schneider.
Using CSP for protocol analysis: the Needham-Schroeder
Public-Key Protocol.
Technical Report CSD-TR-96-14, Royal Holloway, University of London,
October 1996.
- SOR93
-
N. Shankar, S. Owre, and J. M. Rushby.
The PVS Proof Checker: A Reference Manual
(Draft).
Computer Science Laboratory, SRI International, Menlo Park, CA,
February 1993.