Handbook of theoretical computer science (vol. B)
Protocol Interactions and the Chosen Protocol Attack
Proceedings of the 5th International Workshop on Security Protocols
Non-repudiation in SET: Open Issues
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
NUSMV: A New Symbolic Model Verifier
CAV '99 Proceedings of the 11th International Conference on Computer Aided Verification
CSFW '99 Proceedings of the 12th IEEE workshop on Computer Security Foundations
A Semantic Model for Authentication Protocols
SP '93 Proceedings of the 1993 IEEE Symposium on Security and Privacy
Design, implementation, and deployment of the iKP secure electronic payment system
IEEE Journal on Selected Areas in Communications
Detecting and preventing type flaws at static time
Journal of Computer Security - Security Issues in Concurrency (SecCo'07)
Hi-index | 0.00 |
Many security protocols have been shown to have serious design flaws, even a long time after their publication. For this reason, several automatic verification methods have been proposed. As far as we know, all these methods deal with the verification of mono-protocol systems. On the contrary, modern computer systems employ diferent security protocols in the same environment. In this paper, we present a methodology to automatically verify the security of multiprotocol systems based on model checking. We also describe its application to a multi-protocol system composed by SET (by VISA & Mastercard) and 2KP (by IBM).