@inproceedings{9a7b3610b725466c85cb1f5ed70a586c,
title = "Formal verification of cardholder registration in SET",
abstract = "{\textcopyright} Springer-Verlag Berlin Heidelberg 2000.The first phase of the SET protocol, namely Cardholder Registration, has been modelled inductively. This phase is presented in outline and its formal model is described. A number of basic lemmas have been proved about the protocol using Isabelle/HOL, along with a theorem stating that a certification authority will certify a given key at most once. Many ambiguities, contradictions and omissions were noted while formalizing the protocol.",
author = "G. Bella and F. Massacci and L.C. Paulson and P. Tramontano",
year = "2000",
doi = "10.1007/10722599\_10",
language = "English",
isbn = "3540410317",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "159--174",
editor = "F. Cuppens and Y. Deswarte and D. Gollmann and M. Waidner",
booktitle = "Computer Security - 6th European Symposiumon Research in Computer Security, ESORICS 2000, Proceedings",
note = "6th European Symposium on Research in Computer Security, ESORICS 2000 ; Conference date: 04-10-2000 Through 06-10-2000",
}