作者: Catherine Meadows
关键词:
摘要: In this paper we develop methods for analyzing key management and authentication protocols using techniques developed the solutions of equations in a term rewriting system. particular, describe model class possible attacks on those as systems, also software tool based narrowing algorithm that can be used analysis such protocols. We formally protocol results these to analyze security properties. show how flaw was found, verification corrected scheme techniques.