{"title":"用于规范和分析密码协议的环境","authors":"M. Debbabi, Y. Legaré, M. Mejri","doi":"10.1109/CSAC.1998.738652","DOIUrl":null,"url":null,"abstract":"We present the environment CPV (Cryptographic Protocol Verifier), a tool-set for the specification and analysis of cryptographic protocols. The CPV environment is based on the LSFM method that has been advanced as a formal, automatic and implicit verification method for security protocols. We recall briefly the essence of this method and present the architecture of the CPV environment. We discuss its main software components and detail the key issues in its implementation. Finally, we illustrate the LSFM method and the CPV environment on two case studies.","PeriodicalId":426526,"journal":{"name":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1998-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"17","resultStr":"{\"title\":\"An environment for the specification and analysis of cryptoprotocols\",\"authors\":\"M. Debbabi, Y. Legaré, M. Mejri\",\"doi\":\"10.1109/CSAC.1998.738652\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"We present the environment CPV (Cryptographic Protocol Verifier), a tool-set for the specification and analysis of cryptographic protocols. The CPV environment is based on the LSFM method that has been advanced as a formal, automatic and implicit verification method for security protocols. We recall briefly the essence of this method and present the architecture of the CPV environment. We discuss its main software components and detail the key issues in its implementation. Finally, we illustrate the LSFM method and the CPV environment on two case studies.\",\"PeriodicalId\":426526,\"journal\":{\"name\":\"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)\",\"volume\":\"33 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1998-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"17\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSAC.1998.738652\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSAC.1998.738652","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
An environment for the specification and analysis of cryptoprotocols
We present the environment CPV (Cryptographic Protocol Verifier), a tool-set for the specification and analysis of cryptographic protocols. The CPV environment is based on the LSFM method that has been advanced as a formal, automatic and implicit verification method for security protocols. We recall briefly the essence of this method and present the architecture of the CPV environment. We discuss its main software components and detail the key issues in its implementation. Finally, we illustrate the LSFM method and the CPV environment on two case studies.