Analyzing iKP security in applied pi calculus

1Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The security for electronic payments is very important in electronic commerce. Many electronic payment protocols have been proposed recently to meet the security requirements. Since the design of a protocol is a difficult and error-prone task, the use of formal methods that allow for the verification of such protocols has received increasing attention. In this paper we take a look at the iKP from the point of view of the applied pi calculus. The iKP is described in the calculus and some security properties, mainly the authentication and anonymity properties, are verified. © Springer-Verlag 2004.

Cite

CITATION STYLE

APA

Gu, Y., Li, G., & Fu, Y. (2004). Analyzing iKP security in applied pi calculus. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3314, 879–887. https://doi.org/10.1007/978-3-540-30497-5_136

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free