Workshop Papers
(Note: most of these have since been developed into refereed articles.)
- L. C. Paulson.
Inductive analysis of the Internet protocol TLS.
In: Bruce Christianson, Bruno Crispo, William S. Harbison and Michael Roe (editors), Security Protocols: 6th International Workshop 1998. (Springer LNCS 1550, published 1999), 1–12. - L. C. Paulson.
Relations between secrets: the Yahalom protocol (extended abstract).
In: Bruce Christianson, Bruno Crispo, James A. Malcolm and Michael Roe (editors),
Security Protocols: 7th International Workshop 1999 (Springer LNCS 1550, published 2000), 73–77. - Giampaolo Bella and L. C. Paulson.
Making sense of specifications: the formalization of SET.
In: Bruce Christianson, Bruno Crispo, James A. Malcolm and Michael Roe (editors), Security Protocols: 8th International Workshop 2000. (Springer LNCS 2133, published 2001), 74–81. - Giampaolo Bella and L. C. Paulson.
A proof of non-repudiation.
In: Security Protocols: 9th International Workshop 2001. (Springer LNCS 2467, published 2002), 119–125. - Sidi O. Ehmety and L. C. Paulson.
Representing component states in higher-order logic.
In: Richard J. Boulton and Paul B. Jackson (editors),Theorem Proving in Higher Order Logics 2001: Supplemental Proceedings - Christoph Benzmüller, L. C. Paulson, Frank Theiss and Arnaud Fietzke.
Progress Report on Leo-II, an Automatic Theorem Prover for Higher-Order Logic.
In: Klaus Schneider and Jens Brandt (editors), Theorem Proving in Higher Order Logics 2007 — Emerging Trends. - Jean E. Martina and L. C. Paulson.
Verifying Multicast-Based Security Protocols Using the Inductive Method.
CryptoForma Workshop 2011: Workshop on Formal Methods and Cryptography, Limerick, June 2011. - Ralph Romanos, L. C. Paulson.
Proving the impossibility of trisecting an angle and doubling the cube.
Isabelle Users Workshop 2012. Princeton, New Jersey, August 2012.
Isabelle theory develipment • Slides available