This poster paper outlines a method for a search based approach to the development of provably correct protocols. Categories and Subject Descriptors C.2.2 [Computer Communication Networks]: Network Protocols; C.2.0 [Computer Communication Networks]: Security and Protection; D.2.2 [Software Engineering]: Design Tools and Techniques Keywords Security Protocols, Belief Logic, Protocol Synthesis, Heuristic Search, Efficiency Requirements, Protocol Refinement
Hao Chen, John A. Clark, Jeremy Jacob