Verifying the Independence of Security Protocols


Determining if two protocols can be securely run alongside each other requires analyzing the independence of the involved protocols. In this paper we construct a canonical model of security protocols that allows us to conduct a syntactical analysis on the independence of multiple security protocols. By integrating participant knowledge in the model, we are… (More)


3 Figures and Tables

Cite this paper

@article{Bla2007VerifyingTI, title={Verifying the Independence of Security Protocols}, author={Genge B{\'e}la and Ioana Ignat}, journal={2007 IEEE International Conference on Intelligent Computer Communication and Processing}, year={2007}, pages={155-162} }