Automatic security verification for 3-party authentication and key exchange protocols (original) (raw)

Security verification for authentication and key exchange protocols

Shinsaku Kiyomoto

2008 International Symposium on Information Theory and Its Applications, 2008

View PDFchevron_right

Security Verification for Authentication and Key Exchange Protocols, Revisited

Shinsaku Kiyomoto

2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops, 2010

View PDFchevron_right

Formal analysis of a novel mutual authentication and key agreement protocol

Jaafer Al-Saraireh

Journal of Computer Science and Technology, 2011

View PDFchevron_right

A new algorithm for the automatic verification of authentication protocols: From specifications to ˉaws and attack scenarios

Mohamed amine Mejri

1997

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication Protocol

Ian Chai, Sin-Ban Ho

ijcaonline.org

View PDFchevron_right

Security Protocols: Specification, Verification, Implementation, and Composition

Omar Almousa

2016

View PDFchevron_right

Automatic Verification of Security in Payment Protocols for Electronic Commerce

Luca Spalazzi

View PDFchevron_right

Analysis of Key-Exchange Protocols and Their Use for Building Secure Channels

Ran Canetti

Lecture Notes in Computer Science, 2001

View PDFchevron_right

Authenticated Key Agreement Protocols: A Comparative Study

Scientific Research Publishing

View PDFchevron_right

On the logical verification of key exchange protocols for mobile communications

Thomas Newe

2003

View PDFchevron_right

Cryptographic protocols for third generation mobile communication systems

DongGook Park

2001

View PDFchevron_right

Formal automatic verification of authentication cryptographic protocols

Nadia Tawbi

Proceedings First IEEE International Conference on Formal Engineering Methods, 1997

View PDFchevron_right

Automated Design of Security Protocols

John Clark

Computational Intelligence, 2004

View PDFchevron_right

Three Way Authentication Protocol for Privacy Preserving and Ownership Authentication Transfer for Ubiquitous Computing

Sanjay Singh

View PDFchevron_right

HERMES: An Automatic Tool for Verification of Secrecy in Security Protocols

Yassine Lakhnech

Lecture Notes in Computer Science, 2003

View PDFchevron_right

An ID-based authenticated three-party key exchange protocol

Susmita Mandal

ACCENTS Transactions on Information Security, 2017

View PDFchevron_right

An novel three-party authenticated key exchange protocol using one-time key

Maode Ma

Journal of Network and Computer Applications, 2013

View PDFchevron_right

On-The-Fly Automatic Generation of Security Protocols

Shinsaku Kiyomoto

2008

View PDFchevron_right

Security protocols from the software verification perspective

Aleksy Schubert

mimuw.edu.pl

View PDFchevron_right

Security Verification of Social Network Model Using Improved Three-Party Authenticated Key Exchange Protocol

VIVEK KUMAR SINHA, Pankaj Singh

Symmetry

View PDFchevron_right

A Novel Password Protected Key Exchange Protocol

Santosh Naidu, P R SANTOSH NAIDU CSE, JNTUK UCEV

View PDFchevron_right

An Enhanced Authenticated Key Agreement for Session Initiation Protocol

mohammad sabzinejad Farash

View PDFchevron_right

Static validation of security protocols

Abadi Nrl

Journal of Computer Security, 2005

View PDFchevron_right

A New Authenticated Key Agreement Protocol

Kee-Won Kim

New Technologies, Mobility and Security

View PDFchevron_right

Strengthening the security of key exchange protocols

Michele Feltz

2014

View PDFchevron_right

A new method of verification of security protocols

Andrew Mironov

Cornell University - arXiv, 2017

View PDFchevron_right

An IDE for the Design, Verification and Implementation of Security Protocols

Paolo Modesti

IEEE International Symposium on Software Reliability Engineering Workshops , 2017

View PDFchevron_right

Systematic Design of Two-Party Authentication Protocols

Amir Herzberg

Advances in Cryptology — CRYPTO ’91, 1992

View PDFchevron_right

Comparison of existing key establishment protocol

Boyeon Song

KIISC (CISC 2000), 2000

View PDFchevron_right

A New Efficient Protocol for Authenticated Key Agreement

fatma ahmed

International Journal of Computer and Communication Engineering, 2013

View PDFchevron_right