An attack on the Needham-Schroeder public-key authentication protocol
Information Processing Letters
The inductive approach to verifying cryptographic protocols
Journal of Computer Security
Using encryption for authentication in large networks of computers
Communications of the ACM
iKP: a family of secure electronic payment protocols
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Design, implementation, and deployment of the iKP secure electronic payment system
IEEE Journal on Selected Areas in Communications
We Present a Complete Study Involving in the One Hand
QSIC '04 Proceedings of the Quality Software, Fourth International Conference
Modeling and verification of real-time systems based on equations
Science of Computer Programming
Journal of Symbolic Computation
Formal analysis of the iKP electronic payment protocols
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
Formal modeling and verification of sensor network encryption protocol in the OTS/CafeOBJ method
ISoLA'10 Proceedings of the 4th international conference on Leveraging applications of formal methods, verification, and validation - Volume Part I
Fostering proof scores in CafeOBJ
ICFEM'10 Proceedings of the 12th international conference on Formal engineering methods and software engineering
Formal analysis of TESLA protocol in the timed OTS/CafeOBJ method
ISoLA'12 Proceedings of the 5th international conference on Leveraging Applications of Formal Methods, Verification and Validation: applications and case studies - Volume Part II
Hi-index | 0.89 |
We found that the 2KP/3KP electronic payment protocols as well as the 1KP electronic payment protocol do not possess a probably important property. The property is that if an acquirer authorizes a payment, then both the buyer and seller concerned always agree on it, which is called agreement property in this article. We also propose a modification to have 2KP/3KP possess the property.