Timed analysis of security protocols

13Citations
Citations of this article
20Readers
Mendeley users who have this article in their library.
Get full text

Abstract

This paper presents some remarks on the analysis of security protocols taking into account their time properties. Usually untimed or timed protocols are investigated with security properties, such as the secrecy of some data or the allowance of mutual authentication. These properties are independent of time. In this paper we investigate different executions, sometimes executed simultaneously, of a protocol and different types of times: ciphering and deciphering time, step execution time, whole protocol execution time, and delays in the network. Taking this into account we can investigate how these times can be chosen regardless of the possibility of an attack execution. As part of the work we have implemented a tool that helps us in the mentioned work and allows to present some experimental results.

Cite

CITATION STYLE

APA

Szymoniak, S., Siedlecka-Lamch, O., & Kurkowski, M. (2017). Timed analysis of security protocols. Advances in Intelligent Systems and Computing, 522, 53–63. https://doi.org/10.1007/978-3-319-46586-9_5

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free