This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.
|Name||Lecture Notes in Computer Science|
|Conference||conference; CEEMAS 2001, Cracow, Poland; 2001-09-26; 2001-09-29|
|Period||26/09/01 → 29/09/01|
|Other||CEEMAS 2001, Cracow, Poland|