Application of formal methods for analysis of authentication protocols

  • Authors:
  • Ritesh Kumar Tiwari

  • Affiliations:
  • Center for Data Engineering, International Institute of Information Technology, Gachibowli, Hyderabad, India

  • Venue:
  • IWDC'04 Proceedings of the 6th international conference on Distributed Computing
  • Year:
  • 2004

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authentication is a process by which communicating entities prove their identity. As per BAN logic [1], an important but not the only goal of authentication between two entities A and B is to establish First Level Belief and Second Level Belief.