An Anomymous Fair Exchange E-commerce Protocol
IPDPS '01 Proceedings of the 15th International Parallel & Distributed Processing Symposium
An Optimistic Fair Exchange E-commerce Protocol with Automated Dispute Resolution
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Verification of Payment Protocols via MultiAgent Model Checking
CAiSE '02 Proceedings of the 14th International Conference on Advanced Information Systems Engineering
Automatic SAT-Compilation of Protocol Insecurity Problems via Reduction to Planning
FORTE '02 Proceedings of the 22nd IFIP WG 6.1 International Conference Houston on Formal Techniques for Networked and Distributed Systems
A Formal Methodology to Specify E-commerce Systems
ICFEM '02 Proceedings of the 4th International Conference on Formal Engineering Methods: Formal Methods and Software Engineering
Specification of a Smart Card Operating System
TYPES '99 Selected papers from the International Workshop on Types for Proofs and Programs
A Top-Down Look at a Secure Message
Proceedings of the 19th Conference on Foundations of Software Technology and Theoretical Computer Science
Non-repudiation in SET: Open Issues
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Protocol insecurity with a finite number of sessions and composed keys is NP-complete
Theoretical Computer Science
A Tool for Lazy Verification of Security Protocols
Proceedings of the 16th IEEE international conference on Automated software engineering
Protocol Insecurity with Finite Number of Sessions is NP-Complete
CSFW '01 Proceedings of the 14th IEEE workshop on Computer Security Foundations
Automatic verification of security in payment protocols for electronic commerce
Enterprise information systems IV
Automatic verification of the TLS handshake protocol
Proceedings of the 2004 ACM symposium on Applied computing
Strategy for Verifying Security Protocols with Unbounded Message Size
Automated Software Engineering
We Present a Complete Study Involving in the One Hand
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
Proceedings of the 2005 ACM symposium on Applied computing
A flaw in the electronic commerce protocol SET
Information Processing Letters
Modeling and monitoring of E-commerce workflows
Information Sciences: an International Journal
Rewriting Techniques in the Constraint Solver
Electronic Notes in Theoretical Computer Science (ENTCS)
A flaw in the electronic commerce protocol SET
Information Processing Letters
Compiling and verifying security protocols
LPAR'00 Proceedings of the 7th international conference on Logic for programming and automated reasoning
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Secure transaction protocol analysis: models and applications
Secure transaction protocol analysis: models and applications
Hi-index | 0.00 |
We generalize the approach defined in D. Bolignano's "An Approach to the Formal Verification of Cryptographic Protocols" so as to be able to formally verify electronic payment protocols. The original approach is based on the use of general purpose formal methods. It is complementary with modal logic based-approaches as it allows for a description of protocols, hypotheses and authentication properties at a finer level of precision and with more freedom. The proposed generalization mainly requires being able to express and verify payment properties. Such properties are indeed much more elaborate than authentication ones, and require a significant generalization in the way properties are expressed. The modelling of the protocol and of the potential knowledge held by intruders is on the other hand left unchanged. The approach is currently being applied to the C-SET and SET protocols, and has already lead to significant results.