The security for electronic payments is very important in electronic commerce. Many electronic payment protocols have been proposed recently to meet the security requirements. Since the design of a protocol is a difficult and error-prone task, the use of formal methods that allow for the verification of such protocols has received increasing attention. In this paper we take a look at the iKP from the point of view of the applied pi calculus. The iKP is described in the calculus and some security properties, mainly the authentication and anonymity properties, are verified. © Springer-Verlag 2004.
CITATION STYLE
Gu, Y., Li, G., & Fu, Y. (2004). Analyzing iKP security in applied pi calculus. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 879–887. https://doi.org/10.1007/978-3-540-30497-5_136
Mendeley helps you to discover research relevant for your work.