Security Properties Verification of Security Protocols

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verification of Security Protocols

ing nonces by constants, an unbounded execution of the NeedhamSchroeder protocol can be represented by the following set CNS of clauses: ⇒ I(enca(〈na, a〉, pub(i))) I(enca(〈x, a〉, pub(b))) ⇒ I(enca(〈x, nb〉, pub(a))) I(enca(〈na, y〉, pub(a))) ⇒ I(enca(y, pub(i))) For simplicity, we have only described the clauses corresponding to the case where A starts sessions with a corrupted agent I and B is w...

متن کامل

Generic Verification of Security Protocols

Security protocols are notoriously difficult to debug. One approach to the automatic verification of security protocols with a bounded set of agents uses logic programming with analysis and synthesis rules to describe how the attacker gains information and constructs new messages. We propose a generic approach to verifying security protocols in Spin. The dynamic process creation mechanism of Sp...

متن کامل

Diagrammatic Verification of Security Protocols

The Actor Specification Diagram Language is a rigorously defined graphical specification language, with features for modelling concurrency and asynchronous communication. These features make the language appropriate for the formal analysis of distributed security protocols. The graphical nature of the language makes protocol descriptions easy to read and understand, vital properties for appeal ...

متن کامل

Approaches to Formal Verification of Security Protocols

— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal...

متن کامل

Automated Unbounded Verification of Security Protocols

HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt età la diffusion de documents scientifiques de niveau r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Acta Electrotechnica et Informatica

سال: 2014

ISSN: 1335-8243,1338-3957

DOI: 10.15546/aeei-2014-0012