Security Protocol Verification: Symbolic and Computational Models (bibtex)
by Bruno Blanchet
Abstract:
Security protocol verification has been a very active research area since the 1990s. This paper surveys various approaches in this area, considering the verification in the symbolic model, as well as the more recent approaches that rely on the computational model or that verify protocol implementations rather than specifications. Additionally, we briefly describe our symbolic security protocol verifier ProVerif and situate it among these approaches.
Reference:
Security Protocol Verification: Symbolic and Computational Models (Bruno Blanchet), In First Conference on Principles of Security and Trust (POST'12) (Pierpaolo Degano, Joshua Guttman, eds.), Springer Verlag, volume 7215, 2012.
Bibtex Entry:
@string{lncs="Lecture Notes on Computer Science"}
@string{spv="Springer Verlag"}
@InProceedings{BlanchetETAPS12,
  author = 	 {Bruno Blanchet},
  title = 	 {Security Protocol Verification: Symbolic and Computational Models},
  booktitle = {First Conference on Principles of Security and Trust (POST'12)},
  pages = 	 {3--29},
  year = 	 2012,
  editor = 	 {Pierpaolo Degano and Joshua Guttman},
  volume = 	 7215,
  series = 	 lncs,
  address = 	 {Tallinn, Estonia},
  month = 	 mar,
  publisher = spv,
  abstract = {Security protocol verification has been a very active 
research area
since the 1990s. This paper surveys various approaches in this
area, considering the verification in the symbolic model, as
well as the more recent approaches that rely on the computational
model or that verify protocol implementations rather than
specifications. Additionally, we briefly describe our symbolic
security protocol verifier ProVerif and situate it among these approaches.},
  x-audience = {international},
  x-language = {EN},
  x-town = {Tallinn},
  x-country = {EE},
  url = {http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetETAPS12.pdf},
  PDF = {http://prosecco.gforge.inria.fr/personal/bblanche/publications/BlanchetETAPS12.pdf}
}
Powered by bibtexbrowser