Suitability of a Classical Analysis Method for E-commerce Protocols
ISC '01 Proceedings of the 4th International Conference on Information Security
A java beans component architecture for cryptographic protocols
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Formal security analysis of Australian e-passport implementation
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Hi-index | 0.00 |
We give a formal model of protocol security. Our model allows us to reason about the security of protocols, and considers issues of beliefs of agents, time, and secrecy. We prove a composition theorem which allows us to state sufficient conditions on two secureprotocols A and B such that they may be combined to form a new secure protocol C'. Moreover, we give counter-examples to show that when the conditions are not met, the protocol C may not be secure.