2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion 2010
DOI: 10.1109/ssiri-c.2010.34
|View full text |Cite
|
Sign up to set email alerts
|

Modeling and Verifying Security Protocols Using PAT Approach

Abstract: Security protocols play more and more important role nowadays, ranging from banking to electronic commerce systems. They are designed to provide properties such as authentication, key exchanges, key distribution, non-repudiation, proof of origin, integrity, confidentiality and anonymity, for users who wish to exchange messages over a medium over which they have little control. These properties are often difficult to characterize formally (or even informally). The protocols themselves often contain a great deal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
references
References 27 publications
0
0
0
Order By: Relevance