Approaches to Formal Verification of Security Protocols

@article{Lal2011ApproachesTF,
  title={Approaches to Formal Verification of Security Protocols},
  author={Suvansh Lal and Mohit Jain and Vikrant Chaplot},
  journal={CoRR},
  year={2011},
  volume={abs/1101.1815}
}
— In recent times, many protocols have been proposed to provide security for various information and communication systems. Such protocols must be tested for their functional correctness before they are used in practice. Application of formal methods for verification of security protocols would enhance their reliability thereby, increasing the usability of systems that employ them. Thus, formal verification of security protocols has become a key issue in computer and communications security. In… CONTINUE READING
Recent Discussions
This paper has been referenced on Twitter 1 time over the past 90 days. VIEW TWEETS
1 Citations
7 References
Similar Papers

Citations

Publications citing this paper.

References

Publications referenced by this paper.
Showing 1-7 of 7 references

A compiler for the analysis of security protocols

  • Gavin Lowe
  • Journal of Computer Security
  • 1997

García de la Banda , Manuel V . Hermenegildo . Exploiting Goal Independence in the Analysis of Logic . Programs

  • Michael Codish, Maurice Bruynooghe, J Maria
  • Journal of Logic Programming

Similar Papers

Loading similar papers…