By Topic

Verification method of security protocols and its application

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Li Chen ; Henan Univ. of Econ. & Law, Zhengzhou, China ; Xiaoxue Li

The paper researches the typical logic verification methods of security protocols and points out their limitations. Most of them are lack of formal semantics and analysis ability to hybrid cryptography-based primitives. In response on the above-mentioned problems, the paper proposes a new logic verification method, which can analyze most of the known security properties of the e-commerce protocols, such as authentication, secrecy of key, non-repudiation, accountability, fairness and atomicity. The validation of the new logic is verified by analyzing the anonymous e-cash payment protocol and certificated E-mail delivery protocol. The analysis results reveal that the two protocols cannot satisfy the intended security goals.

Published in:

Intelligent Computing and Intelligent Systems (ICIS), 2010 IEEE International Conference on  (Volume:2 )

Date of Conference:

29-31 Oct. 2010