AGVI — automatic generation, verification, and implementation of security protocols

36Citations
Citations of this article
13Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

As new Internet applications emerge, new security protocols and systems need to be designed and implemented. Unfortunately the current protocol design and implementation process is often ad-hoc and error prone. To solve this problem, we have designed and implemented a toolkit AGVI, Automatic Generation, Verification, and Implementation of Security Protocols. With AGVI, the protocol designer inputs the system specification (such as cryptographic key setup) and security requirements. AGVI will then automatically find the near-optimal protocols for the specific application, proves the correctness of the protocols and implement the protocols in Java. Our experiments have successfully generated new and even simpler protocols than the ones documented in the literature.

Cite

CITATION STYLE

APA

Song, D., Perrig, A., & Phan, D. (2001). AGVI — automatic generation, verification, and implementation of security protocols. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2102, pp. 241–245). Springer Verlag. https://doi.org/10.1007/3-540-44585-4_21

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free