Workshop Papers
(Note: most of these have since been developed into refereed articles.)
- L. C. Paulson.
Inductive analysis of the Internet protocol TLS. In: Bruce Christianson, Bruno Crispo, William S. Harbison and Michael Roe (editors), Security Protocols: 6th International Workshop 1998. (Springer LNCS 1550, published 1999), 1–12. - L. C. Paulson.
Relations between secrets: the Yahalom protocol (extended abstract). In: Bruce Christianson, Bruno Crispo, James A. Malcolm and Michael Roe (editors),
Security Protocols: 7th International Workshop 1999 (Springer LNCS 1550, published 2000), 73–77. - Giampaolo Bella and L. C. Paulson.
Making sense of specifications: the formalization of SET. In: Bruce Christianson, Bruno Crispo, James A. Malcolm and Michael Roe (editors), Security Protocols: 8th International Workshop 2000. (Springer LNCS 2133, published 2001), 74–81. - Giampaolo Bella and L. C. Paulson.
A proof of non-repudiation. In: Security Protocols: 9th International Workshop 2001. (Springer LNCS 2467, published 2002), 119–125. - Sidi O. Ehmety and L. C. Paulson.
Representing component states in higher-order logic. In: Richard J. Boulton and Paul B. Jackson (editors),Theorem Proving in Higher Order Logics 2001: Supplemental Proceedings - Markus Wenzel and L. C. Paulson. Isabelle/Isar. In: Freek Wiedijk (editor), The Seventeen Provers of the World (Springer LNCS 3600, 2006), 41–49.
- Christoph Benzmüller, L. C. Paulson, Frank Theiss and Arnaud Fietzke. Progress Report on Leo-II, an Automatic Theorem Prover for Higher-Order Logic. In: Klaus Schneider and Jens Brandt (editors), Theorem Proving in Higher Order Logics 2007 — Emerging Trends.
Last revised: 3 January, 2008