Fourth European Symposium on Research in Computer Security (ESORICS 96)
Analyzing the Needham-Schroeder Public Key Protocol: A Comparison of Two Approaches
Catherine A. Meadows
Abstract : In this paper we contrast the use of the NRL Protocol Analyzer and Gavin Lowe's use of the model checker FDR  to analyze the Needham-Schroeder public key protocol. This is used as a basis for comparing and contrasting the two systems and to point out possible future directions for research.
Proceedings table of contents