Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification

Show simple item record Patel, Reema Borisaniya, Bhavesh Patel, Avi Patel, Dhiren R. Rajarajan, Muttukrishnan Zisman, Andrea
dc.contributor.editor Meghanathan, N.
dc.contributor.editor Boumerdassi, S.
dc.contributor.editor Chaki, N.
dc.contributor.editor Nagamalai, D. 2014-03-19T16:56:28Z 2014-03-19T16:56:28Z 2010
dc.identifier.citation Patel, Dhiren R. et al., “Comparative analysis of formal model checking tools for security protocol verification”, in Recent Trends in Network Security and Applications, Springer Berlin Heidelberg, DOI: 10.1007/978-3-642-14478-3_16, 2010, pp. 152–163, ISBN: 978-3-642-14477-6. en_US
dc.identifier.isbn 9783642144776
dc.description.abstract With the proliferation of universal clients over Internet, use of security protocols is rapidly on rise to minimize associated risks. Security protocols are required to be verified thoroughly before being used to secure applications. There are several approaches and tools exist to verify security protocols. Out of these one of the more suitable is the Formal approach. In this paper, we give an overview of different formal methods and tools available for security protocol verification. en_US
dc.description.statementofresponsibility by Dhiren R. Patel et al.,
dc.format.extent Vol. 89, pp. 152-163
dc.language.iso en en_US
dc.publisher Springer en_US
dc.subject Falsification en_US
dc.subject Formal Methods en_US
dc.subject Security Protocols en_US
dc.subject State Exploration en_US
dc.subject Verification en_US
dc.title Comparative Analysis of Formal Model Checking Tools for Security Protocol Verification en_US
dc.type Book chapter en_US
dc.relation.journal Recent Trends in Network Security and Applications

Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Digital Repository


My Account