Abstract
We introduce formal syntax for specifying protocols and develop an operational semantics that specifies their possible behaviours in the presence of an active adversary.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
D. Dolev, A.C. Yao, On the security of public key protocols. IEEE Trans. Inf. Theory 29(2), 198–207 (1983)
ITU-TS, Recommendation Z.120: Message Sequence Chart (MSC) ITU-TS, Geneva (1999)
R.M. Needham, M. Schroeder, Using encryption for authentication in large networks of computers. Commun. ACM 21(12), 993–999 (1978)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Cremers, C., Mauw, S. (2012). Operational Semantics. In: Operational Semantics and Verification of Security Protocols. Information Security and Cryptography. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-78636-8_3
Download citation
DOI: https://doi.org/10.1007/978-3-540-78636-8_3
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-78635-1
Online ISBN: 978-3-540-78636-8
eBook Packages: Computer ScienceComputer Science (R0)