Auth--The Inductive Approach to Verifying Security Protocols

Cryptographic protocols are of major importance, especially with the growing use of the Internet. This directory demonstrates the ``inductive method'' of protocol verification, which is described in various papers. The operational semantics of protocol participants is defined inductively.

This directory contains proofs concerning

Frederic Blanqui has contributed a theory of guardedness, which is demonstrated by proofs of some roving agent protocols.


Last modified $Date: 2005/03/07 18:19:12 $

Larry Paulson, lcp@cl.cam.ac.uk