Verifying the Independence of Security Protocols

Abstract

Determining if two protocols can be securely run alongside each other requires analyzing the independence of the involved protocols. In this paper we construct a canonical model of security protocols that allows us to conduct a syntactical analysis on the independence of multiple security protocols. By integrating participant knowledge in the model, we are… (More)

Topics

3 Figures and Tables

Cite this paper

@article{Bla2007VerifyingTI, title={Verifying the Independence of Security Protocols}, author={Genge B{\'e}la and Ioana Ignat}, journal={2007 IEEE International Conference on Intelligent Computer Communication and Processing}, year={2007}, pages={155-162} }