Accountability in Electronic Commerce Protocols
IEEE Transactions on Software Engineering
Inductive analysis of the Internet protocol TLS
ACM Transactions on Information and System Security (TISSEC)
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Distributed Algorithms
Formal Verification of Cardholder Registration in SET
ESORICS '00 Proceedings of the 6th European Symposium on Research in Computer Security
A Formal Specification of Requirements for Payment Transactions in the SET Protocol
FC '98 Proceedings of the Second International Conference on Financial Cryptography
Towards the Formal Verification of Electronic Commerce Protocols
CSFW '97 Proceedings of the 10th IEEE workshop on Computer Security Foundations
Model Checking the Secure Electronic Transaction (SET) Protocol
MASCOTS '99 Proceedings of the 7th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems
Flaw and modification of the iKP electronic payment protocols
Information Processing Letters
Model checking electronic commerce protocols
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
NetBill security and transaction protocol
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Design, implementation, and deployment of the iKP secure electronic payment system
IEEE Journal on Selected Areas in Communications
We Present a Complete Study Involving in the One Hand
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
Modeling and verification of real-time systems based on equations
Science of Computer Programming
Simulation-based Verification for Invariant Properties in the OTS/CafeOBJ Method
Electronic Notes in Theoretical Computer Science (ENTCS)
Verifying Design with Proof Scores
Verified Software: Theories, Tools, Experiments
A Specification Translation from Behavioral Specifications to Rewrite Specifications
IEICE - Transactions on Information and Systems
A Toolkit for Generating and Displaying Proof Scores in the OTS/CafeOBJ Method
Electronic Notes in Theoretical Computer Science (ENTCS)
AnBx: security protocols design and verification
ARSPA-WITS'10 Proceedings of the 2010 joint conference on Automated reasoning for security protocol analysis and issues in the theory of security
Fostering proof scores in CafeOBJ
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Induction-guided falsification
ICFEM'06 Proceedings of the 8th international conference on Formal Methods and Software Engineering
Hi-index | 0.00 |
iKP (i-Key-Protocol, i = 1, 2, 3) is a family of payment protocols and one of the ancestors of SET. We have analyzed iKP on the property that if an acquirer authorizes a payment, then both the buyer and seller concerned always agree on it. We have found that even 2KP/3KP do not possess the property and then proposed a possible modification of 2KP/3KP. We have verified that the modified 2KP/3KP possess the property. We mainly describe the verification in this paper.