Automatic security verification for 3-party authentication and key exchange protocols (original) (raw)
Related papers
Security verification for authentication and key exchange protocols
2008 International Symposium on Information Theory and Its Applications, 2008
Security Verification for Authentication and Key Exchange Protocols, Revisited
2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010
Formal analysis of a novel mutual authentication and key agreement protocol
Journal of Computer Science and Technology, 2011
1997
A Comparison Study on Key Exchange-Authentication Protocol
ijcaonline.org
Security Protocols: Specification, Verification, Implementation, and Composition
2016
Automatic Verification of Security in Payment Protocols for Electronic Commerce
Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels
Lecture Notes in Computer Science, 2001
Authenticated Key Agreement Protocols: A Comparative Study
Scientific Research Publishing
On the logical verification of key exchange protocols for mobile communications
2003
Cryptographic protocols for third generation mobile communication systems
2001
Formal automatic verification of authentication cryptographic protocols
Proceedings First IEEE International Conference on Formal Engineering Methods, 1997
Automated Design of Security Protocols
Computational Intelligence, 2004
HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols
Lecture Notes in Computer Science, 2003
An ID-based authenticated three-party key exchange protocol
ACCENTS Transactions on Information Security, 2017
An novel three-party authenticated key exchange protocol using one-time key
Journal of Network and Computer Applications, 2013
On-The-Fly Automatic Generation of Security Protocols
2008
Security protocols from the software verification perspective
mimuw.edu.pl
VIVEK KUMAR SINHA, Pankaj Singh
Symmetry
A Novel Password Protected Key Exchange Protocol
Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV
An Enhanced Authenticated Key Agreement for Session Initiation Protocol
Static validation of security protocols
Journal of Computer Security, 2005
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Strengthening the security of key exchange protocols
2014
A new method of verification of security protocols
Cornell University - arXiv, 2017
An IDE for the Design, Verification and Implementation of Security Protocols
IEEE International Symposium on Software Reliability Engineering Workshops , 2017
Systematic Design of Two-Party Authentication Protocols
Advances in Cryptology — CRYPTO ’91, 1992
Comparison of existing key establishment protocol
KIISC (CISC 2000), 2000
A New Efficient Protocol for Authenticated Key Agreement
International Journal of Computer and Communication Engineering, 2013