Formal models and techniques for analyzing security protocols / edited by Véronique Cortier and Steve Kremer.

Security protocols are the small distributed programs which are omnipresent in our daily lives in areas such as online banking and commerce and mobile phones. Their purpose is to keep our transactions and personal data secure. Because these protocols are generally implemented on potentially insecure...

Full description

Saved in:
Bibliographic Details
Corporate Author: IOS Press
Other Authors: Cortier, Véronique, Kremer, Steve
Format: eBook
Language:English
Published: Amsterdam ; Da Washington, DC : IOS Press, ©2011.
Series:Cryptology and information security series ; v. 5.
Subjects:
Online Access:Click for online access
Table of Contents:
  • Title page; Preface; Contents; Introduction; Verifying a Bounded Number of Sessions and Its Complexity; Constraint Solving Techniques and Enriching the Model with Equational Theories; Analysing Security Protocols Using CSP; Using Horn Clauses for Analyzing Security Protocols; Applied pi Calculus; Types for Security Protocols; Protocol Composition Logic; Shapes: Surveying Crypto Protocol Runs; Security Analysis Using Rank Functions in CSP; Computational Soundness
  • The Case of Diffie-Hellman Keys; Author Index.