Loading…

Formal models and techniques for analyzing security protocols /

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Corporate Author: IOS Press
Other Authors: Cortier, Véronique, Kremer, Steve
Format: Electronic eBook
Language:Inglés
Published: Amsterdam ; Da Washington, DC : IOS Press, ©2011.
Series:Cryptology and information security series ; v. 5.
Subjects:
Online Access:Texto completo
Table of Contents:
  • Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness
  • The Case of Diffie-Hellman Keys; Author Index.