Automatic verification of correspondences for security protocols*

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Automatic verification of correspondences for security protocols

We present a new technique for verifying correspondences in security proto-cols. In particular, correspondences can be used to formalize authentication. Ourtechnique is fully automatic, it can handle an unbounded number of sessions of theprotocol, and it is efficient in practice. It significantly extends a previous techniquefor the verification of secrecy. The protocol is repres...

متن کامل

automatic verification of authentication protocols using genetic programming

implicit and unobserved errors and vulnerabilities issues usually arise in cryptographic protocols and especially in authentication protocols. this may enable an attacker to make serious damages to the desired system, such as having the access to or changing secret documents, interfering in bank transactions, having access to users’ accounts, or may be having the control all over the syste...

15 صفحه اول

Automatic Verification of Security in Payment Protocols for Electronic Commerce

In order to make secure transactions over computer networks, various cryptographic protocols have been proposed but, because of subtleties involved in their design, many of them have been shown to have flaws, even a long time after their publication. For this reason, several automatic verification methods for analyzing these protocols have been devised. The aim of this paper is to present a met...

متن کامل

AnBx: Automatic Generation and Verification of Security Protocols Implementations

The AnBx compiler is a tool for automatic generation of Java implementations of security protocols specified in a simple and abstract model that can be formally verified. In our model-driven development approach, protocols are described in AnBx , an extension of the Alice & Bob notation. Along with the synthesis of consistency checks, the tool analyses the security goals and produces annotation...

متن کامل

AGVI - Automatic Generation, Verification, and Implementation of Security Protocols

As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Veri cation, and Implementation of Security Protocols. With AGVI, the protocol designer inpu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Journal of Computer Security

سال: 2009

ISSN: 1875-8924,0926-227X

DOI: 10.3233/jcs-2009-0339