Repository logo
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Scholalry Output
  3. Publications
  4. Comparative analysis of formal model checking tools for security protocol verification
 
  • Details

Comparative analysis of formal model checking tools for security protocol verification

Source
Communications in Computer and Information Science
ISSN
18650929
Date Issued
2010-10-11
Author(s)
Patel, Reema
Borisaniya, Bhavesh
Patel, Avi
Patel, Dhiren
Rajarajan, Muttukrishnan
Zisman, Andrea
DOI
10.1007/978-3-642-14478-3_16
Volume
89 CCIS
Abstract
With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification. © 2010 Springer-Verlag Berlin Heidelberg.
Unpaywall
URI
https://d8.irins.org/handle/IITG2025/21096
Subjects
Falsification | Formal Methods | Security Protocols | State Exploration | Verification
IITGN Knowledge Repository Developed and Managed by Library

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify