dc.contributor.author |
Patel, Reema |
|
dc.contributor.author |
Borisaniya, Bhavesh |
|
dc.contributor.author |
Patel, Avi |
|
dc.contributor.author |
Patel, Dhiren R. |
|
dc.contributor.author |
Rajarajan, Muttukrishnan |
|
dc.contributor.author |
Zisman, Andrea |
|
dc.contributor.editor |
Meghanathan, N. |
|
dc.contributor.editor |
Boumerdassi, S. |
|
dc.contributor.editor |
Chaki, N. |
|
dc.contributor.editor |
Nagamalai, D. |
|
dc.date.accessioned |
2014-03-19T16:56:28Z |
|
dc.date.available |
2014-03-19T16:56:28Z |
|
dc.date.issued |
2010 |
|
dc.identifier.citation |
Patel, Dhiren R. et al., “Comparative analysis of formal model checking tools for security protocol verification”, in Recent Trends in Network Security and Applications, Springer Berlin Heidelberg, DOI: 10.1007/978-3-642-14478-3_16, 2010, pp. 152–163, ISBN: 978-3-642-14477-6. |
en_US |
dc.identifier.isbn |
9783642144776 |
|
dc.identifier.uri |
http://dx.doi.org/10.1007/978-3-642-14478-3_16 |
|
dc.identifier.uri |
https://repository.iitgn.ac.in/handle/123456789/937 |
|
dc.description.abstract |
With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification. |
en_US |
dc.description.statementofresponsibility |
by Dhiren R. Patel et al., |
|
dc.format.extent |
Vol. 89, pp. 152-163 |
|
dc.language.iso |
en |
en_US |
dc.publisher |
Springer |
en_US |
dc.subject |
Falsification |
en_US |
dc.subject |
Formal Methods |
en_US |
dc.subject |
Security Protocols |
en_US |
dc.subject |
State Exploration |
en_US |
dc.subject |
Verification |
en_US |
dc.title |
Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification |
en_US |
dc.type |
Book chapter |
en_US |
dc.relation.journal |
Recent Trends in Network Security and Applications |
|