Formal Correctness of Security Protocols With 62 Figures and 4 Tables /

Computer network security is critical to fraud prevention and accountability. Network participants are required to observe predefined steps called security protocols, whose proof of correctness is evidence that each protocol step preserves some desired properties. The author investigates proofs of c...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Bella, Giampaolo (Συγγραφέας)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007.
Σειρά:Information Security and Cryptography, Texts and Monographs,
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • The Analysis of Security Protocols
  • The Inductive Method
  • Verifying the Protocol Goals
  • The Principle of Goal Availability
  • Modelling Timestamping and Verifying a Classical Protocol
  • Verifying a Deployed Protocol
  • Modelling Agents’ Knowledge of Messages
  • Verifying Another Deployed Protocol
  • Modelling Smartcards
  • Verifying a Smartcard Protocol
  • Modelling Accountability
  • Verifying Two Accountability Protocols
  • Conclusions.