Login / Signup
Deciding Cryptographic Protocol Adequacy with HOL.
Stephen H. Brackin
Published in:
TPHOLs (1995)
Keyphrases
</>
cryptographic protocols
standard model
formal methods
theorem prover
security protocols
natural deduction
authentication protocol
security properties
insider attacks
theorem proving
higher order logic
encryption decryption