Common program analysis of two-party security protocols using SMV

1Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A common framework, which can be used to analyze the two-party security protocols, is proposed in this paper. With the common framework, a common program is developed in order that any two-party security protocol can be automatically analyzed through SMV with slight modification of the common program. Finally, we illustrate the feasibility and efficiency of the common program analysis with the SSL 3.0 protocol as a case study. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Zhang, Y., & Jia, S. (2006). Common program analysis of two-party security protocols using SMV. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3842 LNCS, pp. 923–930). Springer Verlag. https://doi.org/10.1007/11610496_128

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free