An Approach for Formal Verification of Authentication Protocols

被引:0
|
作者
A. M. Mironov
机构
[1] Innopolis University,
[2] Lomonosov Moscow State University,undefined
来源
关键词
authentication protocols; processes; verification;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:443 / 454
页数:11
相关论文
共 50 条
  • [41] Formal Verification of e-Auction Protocols
    Dreier, Jannik
    Lafourcade, Pascal
    Lakhnech, Yassine
    [J]. PRINCIPLES OF SECURITY AND TRUST, POST 2013, 2013, 7796 : 247 - 266
  • [42] Specification and formal verification of interconnect bus protocols
    Ivanov, L
    Nunna, R
    [J]. PROCEEDINGS OF THE 43RD IEEE MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I-III, 2000, : 378 - 382
  • [43] Formal Verification of Security Protocols Using Spin
    Chen, Shengbo
    Fu, Hao
    Miao, Huaikou
    [J]. 2016 IEEE/ACIS 15TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION SCIENCE (ICIS), 2016, : 637 - 642
  • [44] Towards formal verification of IoT protocols: A Review
    Hofer-Schmitz, Katharina
    Stojanovic, Branka
    [J]. COMPUTER NETWORKS, 2020, 174
  • [45] Formal design of efficient authentication and key agreement protocols
    Jacobson, G
    [J]. SECURE INFORMATION NETWORKS: COMMUNICATIONS AND MULTIMEDIA SECURITY, 1999, 23 : 96 - 113
  • [46] USE OF A FORMAL DESCRIPTION TECHNIQUE IN THE SPECIFICATION OF AUTHENTICATION PROTOCOLS
    VARADHARAJAN, V
    [J]. COMPUTER STANDARDS & INTERFACES, 1990, 9 (03) : 203 - 215
  • [47] Model-driven approach supporting formal verification for web service composition protocols
    Dumez, C.
    Bakhouya, M.
    Gaber, J.
    Wack, M.
    Lorenz, P.
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (04) : 1102 - 1115
  • [48] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON ADVANCES IN P2P SYSTEMS (AP2PS 2010), 2010, : 7 - 13
  • [49] Fast and Automatic Verification of Authentication and Key Exchange Protocols
    Ota, Haruki
    Kiyomoto, Shinsaku
    Miyake, Yutaka
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (04): : 1 - 13
  • [50] Towards automatic verification of authentication protocols on an unbounded network
    Heather, J
    Schneider, S
    [J]. 13TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2000, : 132 - 143