Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification

Show simple item record

dc.contributor.author Patel, Reema
dc.contributor.author Borisaniya, Bhavesh
dc.contributor.author Patel, Avi
dc.contributor.author Patel, Dhiren R.
dc.contributor.author Rajarajan, Muttukrishnan
dc.contributor.author Zisman, Andrea
dc.contributor.editor Meghanathan, N.
dc.contributor.editor Boumerdassi, S.
dc.contributor.editor Chaki, N.
dc.contributor.editor Nagamalai, D.
dc.date.accessioned 2014-03-19T16:56:28Z
dc.date.available 2014-03-19T16:56:28Z
dc.date.issued 2010
dc.identifier.citation Patel, Dhiren R. et al., “Comparative analysis of formal model checking tools for security protocol verification”, in Recent Trends in Network Security and Applications, Springer Berlin Heidelberg, DOI: 10.1007/978-3-642-14478-3_16, 2010, pp. 152–163, ISBN: 978-3-642-14477-6. en_US
dc.identifier.isbn 9783642144776
dc.identifier.uri http://dx.doi.org/10.1007/978-3-642-14478-3_16
dc.identifier.uri https://repository.iitgn.ac.in/handle/123456789/937
dc.description.abstract With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification. en_US
dc.description.statementofresponsibility by Dhiren R. Patel et al.,
dc.format.extent Vol. 89, pp. 152-163
dc.language.iso en en_US
dc.publisher Springer en_US
dc.subject Falsification en_US
dc.subject Formal Methods en_US
dc.subject Security Protocols en_US
dc.subject State Exploration en_US
dc.subject Verification en_US
dc.title Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification en_US
dc.type Book chapter en_US
dc.relation.journal Recent Trends in Network Security and Applications


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


Browse

My Account