On different approaches to establish the security of cryptographic protocols

Tom Coffey, Reiner Dojen, Tomas Flanagan

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Wireless communications place a number of restrictions on the design of suitable security protocols. As a result, new protocols have been proposed, intended especially for wireless applications. Several of these protocols have been found to have significant weaknesses. Formal verification is an essential step to increase confidence in security protocols. This paper discusses different approaches to formal verification. As an example the formal verification of a security protocol for wireless communication demonstrated by using a modal logic.

Original languageEnglish
Title of host publicationProceedings of the International Conference on Security and Management, SAM 2003
EditorsH.R. Arabnia, Y. Mun, H.R. Arabnia, Y. Mun
Pages637-643
Number of pages7
Publication statusPublished - 2003
EventProceedings of the International Conference on Security and Management, SAM 2003 - Las vegas, NV, United States
Duration: 23 Jun 200426 Jun 2004

Publication series

NameProceedings of the International Conference on Security and Management
Volume2

Conference

ConferenceProceedings of the International Conference on Security and Management, SAM 2003
Country/TerritoryUnited States
CityLas vegas, NV
Period23/06/0426/06/04

Keywords

  • Authentication
  • Mobile security
  • Protocol verification
  • Security protocols
  • Verification logics

Fingerprint

Dive into the research topics of 'On different approaches to establish the security of cryptographic protocols'. Together they form a unique fingerprint.

Cite this