@inproceedings{dc497834396b44ffafa61f12ae785d6c,
title = "On different approaches to establish the security of cryptographic protocols",
abstract = "Wireless communications place a number of restrictions on the design of suitable security protocols. As a result, new protocols have been proposed, intended especially for wireless applications. Several of these protocols have been found to have significant weaknesses. Formal verification is an essential step to increase confidence in security protocols. This paper discusses different approaches to formal verification. As an example the formal verification of a security protocol for wireless communication demonstrated by using a modal logic.",
keywords = "Authentication, Mobile security, Protocol verification, Security protocols, Verification logics",
author = "Tom Coffey and Reiner Dojen and Tomas Flanagan",
year = "2003",
language = "English",
isbn = "1932415165",
series = "Proceedings of the International Conference on Security and Management",
pages = "637--643",
editor = "H.R. Arabnia and Y. Mun and H.R. Arabnia and Y. Mun",
booktitle = "Proceedings of the International Conference on Security and Management, SAM 2003",
note = "Proceedings of the International Conference on Security and Management, SAM 2003 ; Conference date: 23-06-2004 Through 26-06-2004",
}