next up previous
Up: CSP, PVS and a Previous: Dealing with failed proofs

References

BO97
J. Bull and D. J. Otway.
The Authentication Protocol.
Technical Report DRA/CIS3/PROJ/CORBA/SC/1/CSM/436-04/03, DRA, Feb 1997.

BS97
J. W. Bryans and S. A. Schneider.
Mechanical Verification of the full Needham-Schroeder Public-Key Protocol.
Technical Report CSD-TR-97-11, Royal Holloway, University of London, April 1997.

DS97a
B. Dutertre and S. A. Schneider.
Embedding CSP in PVS. An application to Authentication Protocols.
Technical Report CSD-TR-97-12, Royal Holloway, University of London, April 1997.

DS97b
B. Dutertre and S. A. Schneider.
Using a PVS Embedding of CSP to verify Authentication Protocols.
In Proceedings of TPHOLS, 1997.
To appear.

DY83
D. Dolev and A. C. Yao.
On the Security of Public Key Protocols.
IEEE Transactions on Information Theory, 29(2), 1983.

Hoa85
C. A. R. Hoare.
Communicating Sequential Processes.
Prentice-Hall, 1985.

Pau97
L. Paulson.
Mechanized proofs for a recursive authentication protocol.
unpublished, 1997.

RS97
P. Y. A. Ryan and S. A. Schneider.
An Attack on a Recursive Authentication Protocol: A cautionary tale.
DRA report, May 1997.

Sch96
S. A. Schneider.
Using CSP for protocol analysis: the Needham-Schroeder Public-Key Protocol.
Technical Report CSD-TR-96-14, Royal Holloway, University of London, October 1996.

SOR93
N. Shankar, S. Owre, and J. M. Rushby.
The PVS Proof Checker: A Reference Manual (Draft).
Computer Science Laboratory, SRI International, Menlo Park, CA, February 1993.