Security protocols preserve essential properties, such as confidentiality and authentication, of electronically transmitted data. However, such properties cannot be directly expressed or verified in contemporary formal methods. Via a detailed example, we describe the phases needed to formalise and verify the correctness of a security protocol in the state-oriented Z formalism. © Springer-Verlag 2003.
CITATION STYLE
Long, B. W., Fidge, C. J., & Cerone, A. (2003). A Z based approach to verifying security protocols. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2885, 375–395. https://doi.org/10.1007/978-3-540-39893-6_22
Mendeley helps you to discover research relevant for your work.