摘要: Many security protocols have the aim of authenticating one agent to another. Yet there is no clear consensus in academic literature about precisely what "authentication" means. We suggest that appropriate authentication requirement will depend upon use which protocol put, and identify several possible definitions "authentication". formalize each definition using process algebra CSP, this formalism study their relative strengths, show how model checker FDR can be used test whether a system running meets such specification.