Comparative analysis of formal model checking tools for security protocol verification

25Citations
Citations of this article
27Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification. © 2010 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Patel, R., Borisaniya, B., Patel, A., Patel, D., Rajarajan, M., & Zisman, A. (2010). Comparative analysis of formal model checking tools for security protocol verification. In Communications in Computer and Information Science (Vol. 89 CCIS, pp. 152–163). https://doi.org/10.1007/978-3-642-14478-3_16

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free